Lookup for vulnerable packages by Package URL.

GET /api/packages/935302?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "pidgin",
    "version": "2.14.14-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87191?format=api",
            "vulnerability_id": "VCID-13y4-t2b9-pkg9",
            "summary": "pidgin: SILC remote crash on channel messages",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4603.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78575",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78614",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78652",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78655",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78653",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7865",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7868",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78688",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78705",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78725",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78748",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78764",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=766446",
                    "reference_id": "766446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820",
                    "reference_id": "RHSA-2011:1820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1820"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4603"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13y4-t2b9-pkg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87192?format=api",
            "vulnerability_id": "VCID-1fmj-vjdg-g3eu",
            "summary": "pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81281",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81303",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81301",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8133",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81356",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81341",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81333",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81371",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81373",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81374",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81396",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81404",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81408",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81424",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81444",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81465",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761510",
                    "reference_id": "761510",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761510"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820",
                    "reference_id": "RHSA-2011:1820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1820"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1821",
                    "reference_id": "RHSA-2011:1821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4602"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1fmj-vjdg-g3eu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33761?format=api",
            "vulnerability_id": "VCID-1p3d-b4v1-6fdg",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77002",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77045",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77052",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77047",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77088",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77089",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77082",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77117",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77124",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77138",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77146",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77176",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77197",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479",
                    "reference_id": "1056479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6477"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3d-b4v1-6fdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33767?format=api",
            "vulnerability_id": "VCID-1x1f-8ujk-53fw",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71584",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71582",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7164",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7167",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71652",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71702",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71706",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71711",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71697",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71731",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71765",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481",
                    "reference_id": "1057481",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6484"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1f-8ujk-53fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87625?format=api",
            "vulnerability_id": "VCID-25qc-25g9-cbhn",
            "summary": "(libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/info/b01c6a1f7fe4d86b83f5f10917b3cb713989cfcc"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050227.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050695.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050133.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=48",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=48"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77566",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77596",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77603",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77553",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80382",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80399",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80415",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80437",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80455",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80318",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80312",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80344",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80349",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01385",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80375",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3711"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/41893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/41893"
                },
                {
                    "reference_url": "http://secunia.com/advisories/41899",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/41899"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42075"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42294"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024623"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62708"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462352"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18506"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:208"
                },
                {
                    "reference_url": "http://www.osvdb.org/68773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/68773"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0890.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/44283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/44283"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1014-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1014-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2753"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2754"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2755"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2847"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2851",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2851"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2870"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=641921",
                    "reference_id": "641921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641921"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3711",
                    "reference_id": "CVE-2010-3711",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3711"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0788",
                    "reference_id": "RHSA-2010:0788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0890",
                    "reference_id": "RHSA-2010:0890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0890"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1014-1/",
                    "reference_id": "USN-1014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1014-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935318?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3711"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25qc-25g9-cbhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88031?format=api",
            "vulnerability_id": "VCID-28mm-t6zv-b3fx",
            "summary": "Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9205",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92064",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92069",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07985",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92088",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92331",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92343",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92342",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92348",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92341",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92351",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92361",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92369",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=529357",
                    "reference_id": "529357",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529357"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535",
                    "reference_id": "RHSA-2009:1535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1535"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1536",
                    "reference_id": "RHSA-2009:1536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1536"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935313?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3615"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28mm-t6zv-b3fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38810?format=api",
            "vulnerability_id": "VCID-2v38-xu17-5ycr",
            "summary": "Multiple vulnerabilities were found in Pidgin, the worst of which\n    allowing for the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0013.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94032",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94041",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94056",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94061",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94062",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94068",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9408",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.12845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94091",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0013"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=552483",
                    "reference_id": "552483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552483"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206",
                    "reference_id": "563206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=563206"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py",
                    "reference_id": "CVE-2010-0013;OSVDB-61420",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/11203.py"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201206-11",
                    "reference_id": "GLSA-201206-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201206-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0044",
                    "reference_id": "RHSA-2010:0044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0044"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935314?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0013"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2v38-xu17-5ycr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38816?format=api",
            "vulnerability_id": "VCID-3m4a-pw2r-zkfb",
            "summary": "Multiple vulnerabilities were found in Pidgin, the worst of which\n    allowing for the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76405",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76409",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76437",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76451",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76465",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76491",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76505",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7653",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76536",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76549",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76538",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76567",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00959",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76585",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481",
                    "reference_id": "743481",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=743481"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201206-11",
                    "reference_id": "GLSA-201206-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201206-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1371",
                    "reference_id": "RHSA-2011:1371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1371"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1273-1/",
                    "reference_id": "USN-1273-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1273-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3594"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4a-pw2r-zkfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33769?format=api",
            "vulnerability_id": "VCID-3zuy-sufn-tfcw",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88236",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88244",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88259",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88263",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88283",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88301",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88293",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88306",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88304",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88303",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88321",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88326",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88329",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88339",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88355",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88367",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489",
                    "reference_id": "1057489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201508-02",
                    "reference_id": "GLSA-201508-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201508-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2101-1/",
                    "reference_id": "USN-2101-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2101-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6487"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zuy-sufn-tfcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33765?format=api",
            "vulnerability_id": "VCID-562h-uev3-nqby",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72956",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72969",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72989",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72965",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73002",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73016",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73041",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7302",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73013",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73055",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73065",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73097",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73107",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73105",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73099",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73127",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73148",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913",
                    "reference_id": "1056913",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6482"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-562h-uev3-nqby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87884?format=api",
            "vulnerability_id": "VCID-59qb-mtwz-puda",
            "summary": "pidgin: Smiley Denial of Service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0423.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92488",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92493",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92521",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92528",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92538",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92541",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92543",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92549",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9256",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9257",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0423"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565792",
                    "reference_id": "565792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115",
                    "reference_id": "RHSA-2010:0115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0115"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/902-1/",
                    "reference_id": "USN-902-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/902-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0423"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-59qb-mtwz-puda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33756?format=api",
            "vulnerability_id": "VCID-5bxz-xddd-rudq",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78602",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78415",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78421",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78452",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78463",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78493",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78467",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78496",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78495",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78491",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78531",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78547",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78562",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78586",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473",
                    "reference_id": "1056473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-6152"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxz-xddd-rudq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33766?format=api",
            "vulnerability_id": "VCID-5k78-mks2-ckdk",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75031",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75034",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75063",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75073",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75085",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75108",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75086",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75075",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7512",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7511",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75149",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75153",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75157",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75166",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75194",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75218",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978",
                    "reference_id": "1056978",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6483"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k78-mks2-ckdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33759?format=api",
            "vulnerability_id": "VCID-5ktd-d1vb-xqhb",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/c31cf8de31cd"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84222",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84029",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84044",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84062",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84085",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84092",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84103",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84099",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84122",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84125",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8415",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84156",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8416",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8418",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84205",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18340"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=67",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=67"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1746-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1746-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041",
                    "reference_id": "910041",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273",
                    "reference_id": "CVE-2013-0273",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646",
                    "reference_id": "RHSA-2013:0646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0646"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1746-1/",
                    "reference_id": "USN-1746-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1746-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-0273"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktd-d1vb-xqhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57769?format=api",
            "vulnerability_id": "VCID-5us8-sghn-zyf1",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/44fd89158777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/44fd89158777"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=88",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=88"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84123",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84136",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84156",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84202",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84215",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84216",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84219",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84244",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84251",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84257",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84302",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84318",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61968"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3055"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2390-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2390-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154910",
                    "reference_id": "1154910",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154910"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3696",
                    "reference_id": "CVE-2014-3696",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854",
                    "reference_id": "RHSA-2017:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2390-1/",
                    "reference_id": "USN-2390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2390-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3696"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5us8-sghn-zyf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33772?format=api",
            "vulnerability_id": "VCID-6gvz-3ye8-zyen",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8763",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87632",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87652",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87658",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87669",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87664",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87661",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87677",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87674",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87691",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87697",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87696",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87711",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87726",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87744",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502",
                    "reference_id": "1057502",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-0020"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvz-3ye8-zyen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88063?format=api",
            "vulnerability_id": "VCID-6jkc-nx2t-7fgd",
            "summary": "Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2703.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70565",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70579",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70619",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70635",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70657",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70628",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70673",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70682",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70712",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70721",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70697",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70738",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70774",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2703"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521823",
                    "reference_id": "521823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453",
                    "reference_id": "RHSA-2009:1453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1453"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535",
                    "reference_id": "RHSA-2009:1535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1535"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935310?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-2703"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jkc-nx2t-7fgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57768?format=api",
            "vulnerability_id": "VCID-6utr-f9hr-wkhd",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/6436e14bdb9d"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=87",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=87"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84123",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84136",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84156",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84202",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84215",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84216",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84219",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84244",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84251",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84257",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84302",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84318",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61968"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3055"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2390-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2390-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154909",
                    "reference_id": "1154909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154909"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3695",
                    "reference_id": "CVE-2014-3695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854",
                    "reference_id": "RHSA-2017:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2390-1/",
                    "reference_id": "USN-2390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2390-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3695"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6utr-f9hr-wkhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87457?format=api",
            "vulnerability_id": "VCID-71bq-9kpe-wbc8",
            "summary": "Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c"
                },
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1091.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81178",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80984",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80993",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81016",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81015",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81043",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8105",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81054",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81047",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81084",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81085",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81082",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81105",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81112",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81121",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81135",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81156",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1091"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43695"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/46376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/46376"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66055"
                },
                {
                    "reference_url": "https://hermes.opensuse.org/messages/13195955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hermes.opensuse.org/messages/13195955"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=51",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=51"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0616.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0616.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-1371.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/46837"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0643"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0661"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0669"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0703"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031",
                    "reference_id": "683031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683031"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1091",
                    "reference_id": "CVE-2011-1091",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0616",
                    "reference_id": "RHSA-2011:0616",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0616"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1371",
                    "reference_id": "RHSA-2011:1371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1371"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1273-1/",
                    "reference_id": "USN-1273-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1273-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935320?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.11-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-1091"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71bq-9kpe-wbc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57364?format=api",
            "vulnerability_id": "VCID-7fz8-kr7a-xqfb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90671",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90676",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90695",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90706",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90712",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90718",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90734",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90732",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90745",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9074",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90757",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90775",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90787",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867",
                    "reference_id": "1348867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2368"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57371?format=api",
            "vulnerability_id": "VCID-7u2r-rnyz-uyd5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65102",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65152",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65143",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65223",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65211",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65183",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65218",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65228",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65225",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65237",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65217",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65264",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65309",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880",
                    "reference_id": "1348880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2375"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57376?format=api",
            "vulnerability_id": "VCID-83az-td85-sudb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67371",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67393",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67459",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67446",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67449",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67461",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67441",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67444",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67488",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67527",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856",
                    "reference_id": "1348856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2380"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87083?format=api",
            "vulnerability_id": "VCID-8951-ngtt-pfb5",
            "summary": "pidgin: Improper validation of incoming plaintext messages in MSN protocol plug-in",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2318.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74736",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74766",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7474",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74773",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74788",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74781",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74824",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74815",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74851",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74858",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74862",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74868",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74896",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00845",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74921",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=819446",
                    "reference_id": "819446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102",
                    "reference_id": "RHSA-2012:1102",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1102"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935325?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-2318"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8951-ngtt-pfb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/145993?format=api",
            "vulnerability_id": "VCID-8a4f-csqh-53fu",
            "summary": "gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79415",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79421",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79444",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79431",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79459",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79491",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79492",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79528",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79534",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7955",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79565",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79587",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01267",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79605",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6486"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api",
                    "purl": "pkg:deb/debian/pidgin@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6486"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8a4f-csqh-53fu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57363?format=api",
            "vulnerability_id": "VCID-9btk-pnjv-1qgb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83389",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8344",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83454",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83489",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83491",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83493",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83515",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83549",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83571",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8359",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865",
                    "reference_id": "1348865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2367"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41429?format=api",
            "vulnerability_id": "VCID-9hw9-a9yt-p7fv",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n    remote arbitrary code execution, Denial of Service and service spoofing.",
            "references": [
                {
                    "reference_url": "http://crisp.cs.du.edu/?q=ca2007-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://crisp.cs.du.edu/?q=ca2007-1"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2957.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2957",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82463",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8226",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82273",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82293",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82287",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82314",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82335",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82329",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82363",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82364",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82367",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82388",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82403",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82421",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01709",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82443",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2957"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33102"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/06/27/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2008/06/27/3"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29985"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-675-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-675-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453740",
                    "reference_id": "453740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453740"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632",
                    "reference_id": "488632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2957",
                    "reference_id": "CVE-2008-2957",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2957"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-13",
                    "reference_id": "GLSA-200901-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023",
                    "reference_id": "RHSA-2008:1023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:1023"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/675-1/",
                    "reference_id": "USN-675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935305?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.4.3-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-2957"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hw9-a9yt-p7fv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57366?format=api",
            "vulnerability_id": "VCID-9npz-w7g5-r3b5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871",
                    "reference_id": "1348871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2370"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41428?format=api",
            "vulnerability_id": "VCID-9sg6-dv5z-sbfq",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n    remote arbitrary code execution, Denial of Service and service spoofing.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2955.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95149",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95072",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95083",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95085",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95102",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95103",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95106",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95115",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9512",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95121",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95122",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95134",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.17668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9514",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2955"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30881"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33102"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/3966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/3966"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10131"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18050"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493682/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493682/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29985"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-675-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-675-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1947"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453736",
                    "reference_id": "453736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453736"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632",
                    "reference_id": "488632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488632"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2955",
                    "reference_id": "CVE-2008-2955",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2955"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt",
                    "reference_id": "CVE-2008-2955;OSVDB-46576",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32749.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/33414/info",
                    "reference_id": "CVE-2008-2955;OSVDB-46576",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/33414/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-13",
                    "reference_id": "GLSA-200901-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023",
                    "reference_id": "RHSA-2008:1023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:1023"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/675-1/",
                    "reference_id": "USN-675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/675-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935304?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.4.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-2955"
            ],
            "risk_score": 7.8,
            "exploitability": "2.0",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sg6-dv5z-sbfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87193?format=api",
            "vulnerability_id": "VCID-ach7-fhrx-zqd3",
            "summary": "(libpurple): Invalid UTF-8 string handling in OSCAR messages",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88018",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88048",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88067",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88073",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88083",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88076",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88077",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8809",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88106",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88111",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8811",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88121",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88137",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8815",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=761517",
                    "reference_id": "761517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1820",
                    "reference_id": "RHSA-2011:1820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1820"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1821",
                    "reference_id": "RHSA-2011:1821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935323?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4601"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ach7-fhrx-zqd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41430?format=api",
            "vulnerability_id": "VCID-ag3e-ee6x-tbcv",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n    remote arbitrary code execution, Denial of Service and service spoofing.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434"
                },
                {
                    "reference_url": "http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch"
                },
                {
                    "reference_url": "http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch"
                },
                {
                    "reference_url": "http://developer.pidgin.im/ticket/6500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/ticket/6500"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3532.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87577",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87439",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87449",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87484",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8749",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87501",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87497",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87509",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87511",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87532",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87531",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87544",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87559",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31390"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33102"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44220"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:025"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-1023.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30553"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-675-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-675-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2318"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457907",
                    "reference_id": "457907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457907"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434",
                    "reference_id": "492434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3532",
                    "reference_id": "CVE-2008-3532",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3532"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-13",
                    "reference_id": "GLSA-200901-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:1023",
                    "reference_id": "RHSA-2008:1023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:1023"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/675-1/",
                    "reference_id": "USN-675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935306?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.4.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3532"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ag3e-ee6x-tbcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87883?format=api",
            "vulnerability_id": "VCID-b7pa-sgwm-cbea",
            "summary": "pidgin: Finch XMPP MUC Crash",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8721",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8722",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87252",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8726",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87266",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87262",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87277",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87276",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87294",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.873",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87303",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8732",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87333",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87351",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565786",
                    "reference_id": "565786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565786"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115",
                    "reference_id": "RHSA-2010:0115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0115"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/902-1/",
                    "reference_id": "USN-902-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/902-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0420"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7pa-sgwm-cbea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34329?format=api",
            "vulnerability_id": "VCID-b8e9-rkt5-cfch",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n    remote execution of arbitrary code, unauthorized information disclosure, or\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3026.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66964",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67001",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67026",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67049",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67062",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67081",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67067",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67069",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67083",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67064",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67085",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67098",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67097",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67107",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3026"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=519224",
                    "reference_id": "519224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519224"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891",
                    "reference_id": "542891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542891"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200910-02",
                    "reference_id": "GLSA-200910-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200910-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453",
                    "reference_id": "RHSA-2009:1453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935311?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3026"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8e9-rkt5-cfch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33764?format=api",
            "vulnerability_id": "VCID-b8zp-g4xa-t7ad",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77002",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77045",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77052",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77047",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77088",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77089",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77082",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77117",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77124",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77138",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77146",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77176",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77197",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908",
                    "reference_id": "1056908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6481"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zp-g4xa-t7ad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57770?format=api",
            "vulnerability_id": "VCID-bqxx-44k8-t7fd",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/ea46ab68f0dc"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=90",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=90"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3698.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7991",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79916",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79937",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79926",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79955",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79983",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79967",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79986",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79988",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80017",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80022",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80039",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80074",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80089",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61968"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3055"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2390-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2390-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154911",
                    "reference_id": "1154911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154911"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3698",
                    "reference_id": "CVE-2014-3698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3698"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854",
                    "reference_id": "RHSA-2017:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2390-1/",
                    "reference_id": "USN-2390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2390-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3698"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqxx-44k8-t7fd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57367?format=api",
            "vulnerability_id": "VCID-ca59-9ma2-nyek",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8759",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.876",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87613",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87636",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87653",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8766",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87661",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87658",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87682",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87681",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87696",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87711",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87729",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873",
                    "reference_id": "1348873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2371"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57370?format=api",
            "vulnerability_id": "VCID-cd64-6y6b-rfa3",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86001",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86065",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.861",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8611",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86129",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86151",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86169",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878",
                    "reference_id": "1348878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2374"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37785?format=api",
            "vulnerability_id": "VCID-cmm5-mw5m-bud2",
            "summary": "A vulnerability in Pidgin might allow remote attackers to execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72798",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72755",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72773",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72635",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72651",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72663",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72701",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72705",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72746",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76335",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76331",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430019",
                    "reference_id": "1430019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430019"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159",
                    "reference_id": "859159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859159"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201703-18",
                    "reference_id": "ASA-201703-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201703-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-226",
                    "reference_id": "AVG-226",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-226"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-10",
                    "reference_id": "GLSA-201706-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854",
                    "reference_id": "RHSA-2017:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3231-1/",
                    "reference_id": "USN-3231-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3231-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935331?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.12.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.12.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-2640"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmm5-mw5m-bud2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87084?format=api",
            "vulnerability_id": "VCID-cxh3-6xaf-q7fa",
            "summary": "pidgin: Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2214.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67633",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67669",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6769",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6767",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67722",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67736",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6776",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67745",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67712",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67747",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67761",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67772",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67774",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67751",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67793",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67832",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=819449",
                    "reference_id": "819449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819449"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935325?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-2214"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cxh3-6xaf-q7fa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87541?format=api",
            "vulnerability_id": "VCID-dw47-rgd5-yked",
            "summary": "Pidgin: MSN DirectConnect DoS (crash) after receiving a short P2P message",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/e76f4ad4ef2f10588195a0eedc7a08f82062f79c/with/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031/libpurple/protocols/msn/directconn.c"
                },
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/info/aaa07bde3c51d3684391ae6ed86b6dbaeab5d031"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052862.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052905.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"
                },
                {
                    "reference_url": "http://pidgin.im/pipermail/support/2010-December/009251.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/pipermail/support/2010-December/009251.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4528.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85969",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85794",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85806",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85828",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85847",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85865",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85888",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8588",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85901",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8591",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85911",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85929",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02691",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85951",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4528"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42732"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42824"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42877"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18461"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:259"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/12/27/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/12/27/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/12/31/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/12/31/5"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=49",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=49"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45581"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0028"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0054"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0076"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331",
                    "reference_id": "608331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608331"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=665421",
                    "reference_id": "665421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665421"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:libpurple:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4528",
                    "reference_id": "CVE-2010-4528",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4528"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935319?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-4528"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dw47-rgd5-yked"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33771?format=api",
            "vulnerability_id": "VCID-ebg2-bj5n-tycb",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97246",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97251",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97257",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97258",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97264",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97269",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9727",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97278",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9728",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97283",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97286",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9729",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97295",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.38978",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97299",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498",
                    "reference_id": "1057498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6490"
            ],
            "risk_score": 0.2,
            "exploitability": "0.5",
            "weighted_severity": "0.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebg2-bj5n-tycb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33758?format=api",
            "vulnerability_id": "VCID-ektc-z3zf-dfep",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83354",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83145",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83162",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83175",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83174",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83221",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83215",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83211",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83248",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83273",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83281",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83289",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83313",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01896",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83334",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=66",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=66"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/57951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/57951"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1746-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1746-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040",
                    "reference_id": "910040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272",
                    "reference_id": "CVE-2013-0272",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646",
                    "reference_id": "RHSA-2013:0646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0646"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1746-1/",
                    "reference_id": "USN-1746-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1746-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-0272"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ektc-z3zf-dfep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87290?format=api",
            "vulnerability_id": "VCID-et2z-svg6-m3ef",
            "summary": "pidgin: Remote crash in MSN protocol plugin",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3184.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85796",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85807",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85825",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8583",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85848",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85858",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85873",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85866",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85889",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85882",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85903",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85911",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85913",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85931",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85953",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02692",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8597",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3184"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=732405",
                    "reference_id": "732405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732405"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1273-1/",
                    "reference_id": "USN-1273-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1273-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935321?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3184"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et2z-svg6-m3ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87800?format=api",
            "vulnerability_id": "VCID-ftdp-6cub-sqah",
            "summary": "Pidgin: MSN SLP emoticon DoS (NULL pointer dereference)",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/884d44222e8c81ecec51c25e07d005e002a5479b/with/894460d22c434e73d60b71ec031611988e687c8b/libpurple/protocols/msn/slp.c"
                },
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/info/894460d22c434e73d60b71ec031611988e687c8b"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86896",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86734",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86781",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86803",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86796",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86811",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86815",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86814",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86836",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86859",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86878",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39801"
                },
                {
                    "reference_url": "http://secunia.com/advisories/41899",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/41899"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58559"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18547"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:097"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/index.php?id=46",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/index.php?id=46"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0788.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/40138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/40138"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1014-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1014-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1141"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2755"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=589973",
                    "reference_id": "589973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=589973"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1624",
                    "reference_id": "CVE-2010-1624",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1624"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0788",
                    "reference_id": "RHSA-2010:0788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0788"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1014-1/",
                    "reference_id": "USN-1014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1014-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935316?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-1624"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdp-6cub-sqah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34327?format=api",
            "vulnerability_id": "VCID-g8q8-pb2g-qfct",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n    remote execution of arbitrary code, unauthorized information disclosure, or\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1889.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87034",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87053",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87074",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87087",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87082",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87076",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87092",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87093",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87118",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87154",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87172",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=508738",
                    "reference_id": "508738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508738"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790",
                    "reference_id": "535790",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535790"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200910-02",
                    "reference_id": "GLSA-200910-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200910-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1139",
                    "reference_id": "RHSA-2009:1139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/796-1/",
                    "reference_id": "USN-796-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/796-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935308?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-1889"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g8q8-pb2g-qfct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87321?format=api",
            "vulnerability_id": "VCID-gmc8-mf63-x7fs",
            "summary": "pidgin: Crash in IRC protocol plug-in by listing set of users (/who command) upon session startup",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2943.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88302",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8831",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8833",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88349",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88355",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88366",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88358",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88373",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8837",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88387",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88391",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88392",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88403",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88419",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03955",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88432",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2943"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709",
                    "reference_id": "638709",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638709"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722939",
                    "reference_id": "722939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722939"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935321?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-2943"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmc8-mf63-x7fs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34328?format=api",
            "vulnerability_id": "VCID-j7ap-11qk-ufeb",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n    remote execution of arbitrary code, unauthorized information disclosure, or\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96983",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96991",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96995",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97007",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9701",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97011",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97012",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97021",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97024",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97028",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97029",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97031",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97033",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97035",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97039",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.34712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97045",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=514957",
                    "reference_id": "514957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514957"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486",
                    "reference_id": "542486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542486"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200910-02",
                    "reference_id": "GLSA-200910-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200910-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1218",
                    "reference_id": "RHSA-2009:1218",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1218"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/820-1/",
                    "reference_id": "USN-820-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/820-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935309?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-2694"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7ap-11qk-ufeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33763?format=api",
            "vulnerability_id": "VCID-jb3a-ydyh-sfft",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71584",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71582",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7164",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71665",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7167",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71652",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71702",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71706",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71711",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71697",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71731",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00683",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71765",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907",
                    "reference_id": "1056907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6479"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jb3a-ydyh-sfft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90576?format=api",
            "vulnerability_id": "VCID-jrfq-eubr-hfa9",
            "summary": "The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect \"UTF16-LE\" charset name.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3084.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80243",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8025",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80259",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80286",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80296",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80315",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80294",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80324",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80326",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8033",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80356",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80362",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80379",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80395",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80417",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01382",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80436",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3084"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrfq-eubr-hfa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51484?format=api",
            "vulnerability_id": "VCID-ksp5-2txt-vucn",
            "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n    arbitrary code or a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1375.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89962",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89964",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89977",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89983",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89998",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90004",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9001",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9002",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90017",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90035",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90034",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90046",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90061",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90073",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500491",
                    "reference_id": "500491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500491"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200905-07",
                    "reference_id": "GLSA-200905-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200905-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060",
                    "reference_id": "RHSA-2009:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-1/",
                    "reference_id": "USN-781-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-1375"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksp5-2txt-vucn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57361?format=api",
            "vulnerability_id": "VCID-kt42-hfwm-7ubh",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87069",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87098",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87122",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87164",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87185",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87201",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8722",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858",
                    "reference_id": "1348858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2365"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87339?format=api",
            "vulnerability_id": "VCID-mhjx-yrdy-5qf6",
            "summary": "pidgin: NULL pointer dereference in the XMPP protocol plug-in by renaming user name",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4939.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78026",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78083",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78066",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78062",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78097",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78123",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78129",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78143",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78154",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78181",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78197",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4939"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028",
                    "reference_id": "664028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664028"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=803296",
                    "reference_id": "803296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803296"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935324?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4939"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mhjx-yrdy-5qf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/137516?format=api",
            "vulnerability_id": "VCID-mjen-7k79-vyd4",
            "summary": "gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89769",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89771",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89786",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89789",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89807",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89819",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89818",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8981",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89824",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89833",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89845",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89861",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89872",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3185"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api",
                    "purl": "pkg:deb/debian/pidgin@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3185"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mjen-7k79-vyd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57368?format=api",
            "vulnerability_id": "VCID-myh5-wcpe-zbac",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78988",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78994",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79005",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79029",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7906",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79045",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79063",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79091",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79097",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79112",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79124",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79145",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79162",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876",
                    "reference_id": "1348876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2372"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57372?format=api",
            "vulnerability_id": "VCID-nhj7-agfp-rue8",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91312",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91317",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91327",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91347",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91363",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91386",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91397",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91395",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91409",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91425",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91435",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848",
                    "reference_id": "1348848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2376"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33760?format=api",
            "vulnerability_id": "VCID-nvtc-a3b6-23bs",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/ad7e7fb98db3"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0274.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64893",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64675",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64717",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64765",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6478",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64797",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64786",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64758",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64796",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64807",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64811",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64824",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64821",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64801",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00474",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64849",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18221"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=68",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=68"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1746-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1746-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042",
                    "reference_id": "910042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274",
                    "reference_id": "CVE-2013-0274",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0646",
                    "reference_id": "RHSA-2013:0646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0646"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1746-1/",
                    "reference_id": "USN-1746-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1746-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-0274"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvtc-a3b6-23bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57767?format=api",
            "vulnerability_id": "VCID-nxhy-m3bd-6qab",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/2e4475087f04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/2e4475087f04"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=86",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=86"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79442",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79472",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79459",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79487",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79495",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79517",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.795",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79523",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79561",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79576",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79591",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79613",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79631",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61968"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3055"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2390-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2390-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154908",
                    "reference_id": "1154908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154908"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3694",
                    "reference_id": "CVE-2014-3694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1854",
                    "reference_id": "RHSA-2017:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1854"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2390-1/",
                    "reference_id": "USN-2390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2390-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935329?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3694"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhy-m3bd-6qab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87721?format=api",
            "vulnerability_id": "VCID-p1gr-bcnk-pkg7",
            "summary": "pidgin: ICQ X-Status denial of service (NULL deref)",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/fcb70f7c12120206d30ad33223ff85be7b226d1c/with/8e8ff246492e45af8f8d0808296d6f2906794dc0/libpurple/protocols/oscar/family_icbm.c"
                },
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/info/8e8ff246492e45af8f8d0808296d6f2906794dc0"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2528.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84112",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83921",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83935",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83951",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83954",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83977",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83984",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83993",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84015",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84043",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8405",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84054",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84074",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84097",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2528"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40699"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60566"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.462873"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18359"
                },
                {
                    "reference_url": "http://www.osvdb.org/66506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/66506"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/index.php?id=47",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/index.php?id=47"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/41881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/41881"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1887",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1887"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2221"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617105",
                    "reference_id": "617105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617105"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2528",
                    "reference_id": "CVE-2010-2528",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2528"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935317?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2528"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p1gr-bcnk-pkg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88065?format=api",
            "vulnerability_id": "VCID-p8dm-3wjm-8bgd",
            "summary": "Pidgin: NULL pointer dereference by processing a custom smiley (DoS)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76294",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76298",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76307",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7638",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76358",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76353",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76394",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76385",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76419",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76426",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76439",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76428",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76456",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76476",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3085"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521853",
                    "reference_id": "521853",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521853"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453",
                    "reference_id": "RHSA-2009:1453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3085"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8dm-3wjm-8bgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59146?format=api",
            "vulnerability_id": "VCID-q5v4-yz4d-yydy",
            "summary": "A buffer overflow in Pidgin might allow remote attackers to execute\n    arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3374.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89323",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89328",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8934",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89342",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89359",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89363",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89372",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89369",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89381",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89377",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89394",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89399",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89401",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8941",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89429",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89442",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661",
                    "reference_id": "680661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=837319",
                    "reference_id": "837319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837319"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-17",
                    "reference_id": "GLSA-201209-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-17"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102",
                    "reference_id": "RHSA-2012:1102",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1102"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935326?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3374"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5v4-yz4d-yydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41427?format=api",
            "vulnerability_id": "VCID-qhab-ydb4-b7gq",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, allowing for\n    remote arbitrary code execution, Denial of Service and service spoofing.",
            "references": [
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msnp9/slplink.c"
                },
                {
                    "reference_url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://developer.pidgin.im/viewmtn/revision/diff/6eb1949a96fa80a4c744fc749c2562abc4cc9ed6/with/c3831c9181f4f61b747321240086ee79e4a08fd8/libpurple/protocols/msn/slplink.c"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2927.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91056",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90929",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90934",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90943",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90954",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90965",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90971",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9098",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91005",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91019",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91017",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91013",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91043",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30971"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31016"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31105"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31387"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31642"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32861"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44774"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2647"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1610"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:143"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:127"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/07/03/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2008/07/03/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/07/04/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2008/07/04/1"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=25",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=25"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0584.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0584.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493682",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493682"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495165/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495165/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495818/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495818/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29956"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020451"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-675-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-675-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-675-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-675-2"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2032/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2032/references"
                },
                {
                    "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-08-054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-054"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=453764",
                    "reference_id": "453764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453764"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:adium:adium:1.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2927",
                    "reference_id": "CVE-2008-2927",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2927"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-13",
                    "reference_id": "GLSA-200901-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0584",
                    "reference_id": "RHSA-2008:0584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0584"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/675-1/",
                    "reference_id": "USN-675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/675-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/675-2/",
                    "reference_id": "USN-675-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/675-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935304?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.4.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.4.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-2927"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhab-ydb4-b7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57374?format=api",
            "vulnerability_id": "VCID-r5z8-wmea-a7by",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87253",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87271",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87278",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87299",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87311",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8733",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854",
                    "reference_id": "1348854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2378"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88064?format=api",
            "vulnerability_id": "VCID-rzq7-5psb-dygh",
            "summary": "Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3083.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79556",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79562",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79572",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.796",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79607",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79628",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79612",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79605",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79635",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79634",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79637",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79668",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79675",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79691",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79707",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79729",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79747",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3083"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521832",
                    "reference_id": "521832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521832"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1453",
                    "reference_id": "RHSA-2009:1453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1453"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1535",
                    "reference_id": "RHSA-2009:1535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1535"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935312?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3083"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzq7-5psb-dygh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51483?format=api",
            "vulnerability_id": "VCID-s4gw-ntgc-5bad",
            "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n    arbitrary code or a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1374.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89021",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89029",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89045",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89064",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89069",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8908",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89076",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89074",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89084",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89103",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89109",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89113",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8912",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89136",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89147",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500490",
                    "reference_id": "500490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500490"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200905-07",
                    "reference_id": "GLSA-200905-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200905-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060",
                    "reference_id": "RHSA-2009:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-1/",
                    "reference_id": "USN-781-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-1374"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4gw-ntgc-5bad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90489?format=api",
            "vulnerability_id": "VCID-sap1-hcpz-a7dm",
            "summary": "libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remote attackers to cause a denial of service (NULL dereference and application crash) via a message that contains invalid HTML data, a different vector than CVE-2007-4996.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4999.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81306",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81315",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81337",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81335",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81364",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81391",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81407",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81429",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81437",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81441",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81458",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81478",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81499",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/548-1/",
                    "reference_id": "USN-548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935303?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.2.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-4999"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sap1-hcpz-a7dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88637?format=api",
            "vulnerability_id": "VCID-stg3-h3jz-wfa9",
            "summary": "MSN nudges sent from unknown buddies can cause libpurple to crash",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4996.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81879",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81898",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81886",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81881",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81918",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81917",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81919",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81953",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81958",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81978",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81998",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82023",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4996"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=314451",
                    "reference_id": "314451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=314451"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935300?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.2.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.2.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-4996"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stg3-h3jz-wfa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33768?format=api",
            "vulnerability_id": "VCID-stm8-xdkh-7bdf",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71857",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71876",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71922",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71904",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71929",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71963",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71968",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71965",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71957",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71992",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72022",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484",
                    "reference_id": "1057484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6485"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stm8-xdkh-7bdf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33770?format=api",
            "vulnerability_id": "VCID-tsth-71zg-n3g7",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73217",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73253",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73267",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73308",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73316",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73343",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73356",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73354",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73349",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73376",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73399",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490",
                    "reference_id": "1057490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6489"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsth-71zg-n3g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51482?format=api",
            "vulnerability_id": "VCID-ua4g-zzrd-eyhb",
            "summary": "Multiple vulnerabilities in Pidgin might allow for the remote execution of\n    arbitrary code or a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92264",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92277",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92279",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92291",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92295",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.923",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92301",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92312",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92316",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92317",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92323",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92333",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92341",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500488",
                    "reference_id": "500488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500488"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200905-07",
                    "reference_id": "GLSA-200905-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200905-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1059",
                    "reference_id": "RHSA-2009:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060",
                    "reference_id": "RHSA-2009:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-1/",
                    "reference_id": "USN-781-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-2/",
                    "reference_id": "USN-781-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-1373"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua4g-zzrd-eyhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57373?format=api",
            "vulnerability_id": "VCID-uf3q-52zp-p3bk",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87253",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87271",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87278",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87299",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87311",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8733",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852",
                    "reference_id": "1348852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2377"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87945?format=api",
            "vulnerability_id": "VCID-vc51-jjp7-v7gb",
            "summary": "pidgin MSN protocol plugin memory corruption",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0277.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92488",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92493",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92521",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92528",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92538",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92541",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92543",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92549",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9256",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08804",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9257",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0277"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=554335",
                    "reference_id": "554335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554335"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775",
                    "reference_id": "566775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566775"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0115",
                    "reference_id": "RHSA-2010:0115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0115"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/902-1/",
                    "reference_id": "USN-902-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/902-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935315?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0277"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc51-jjp7-v7gb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57360?format=api",
            "vulnerability_id": "VCID-vczt-sf85-uyfc",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72987",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72819",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72795",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72834",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72848",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72855",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.729",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72893",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72934",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72944",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72941",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72936",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72962",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882",
                    "reference_id": "1348882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000030"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57377?format=api",
            "vulnerability_id": "VCID-vmjg-nj4a-8uby",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83581",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83594",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8361",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83642",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83652",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83647",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83682",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83683",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83707",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83715",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8372",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83743",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8378",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857",
                    "reference_id": "1348857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-4323"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/148581?format=api",
            "vulnerability_id": "VCID-vu3h-hcpa-8ubp",
            "summary": "Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/68b8eb10977f"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html"
                },
                {
                    "reference_url": "http://pidgin.im/news/security/?id=89",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pidgin.im/news/security/?id=89"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77436",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77233",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7724",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77268",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7725",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77281",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77296",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77294",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77334",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77333",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77326",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77366",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77378",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77387",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77414",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3697"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3697",
                    "reference_id": "CVE-2014-3697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3697"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935322?format=api",
                    "purl": "pkg:deb/debian/pidgin@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3697"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3h-hcpa-8ubp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87163?format=api",
            "vulnerability_id": "VCID-whc9-ffhd-j3b6",
            "summary": "pidgin: Client abort in the MSN protocol plug-in by attempt to display certain, not UTF-8 encoded text",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1178.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78319",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78326",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78357",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78339",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78366",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78372",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78398",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78402",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78401",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78432",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78439",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78455",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78469",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78493",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7851",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1178"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030",
                    "reference_id": "664030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664030"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=803298",
                    "reference_id": "803298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803298"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1102",
                    "reference_id": "RHSA-2012:1102",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1102"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935324?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1178"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whc9-ffhd-j3b6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33762?format=api",
            "vulnerability_id": "VCID-wprn-gtbj-ukgf",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86751",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86762",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86781",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86778",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86798",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86807",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8682",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86812",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86828",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86832",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86831",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86854",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86855",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86878",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86897",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86914",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904",
                    "reference_id": "1056904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139",
                    "reference_id": "RHSA-2014:0139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2100-1/",
                    "reference_id": "USN-2100-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2100-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935327?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6478"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wprn-gtbj-ukgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90574?format=api",
            "vulnerability_id": "VCID-x5c5-b5s8-bbe1",
            "summary": "Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers to cause a denial of service (crash) via a link in a Yahoo IM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3025.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71659",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71683",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71656",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71696",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71714",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71728",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71777",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71782",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71788",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71773",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71806",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71839",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3025"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935311?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.6.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.6.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-3025"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5c5-b5s8-bbe1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87509?format=api",
            "vulnerability_id": "VCID-xekx-jf8h-93hy",
            "summary": "Cipher API information disclosure in pidgin",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29276",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29196",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29202",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29156",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29103",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29129",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29106",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28939",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28827",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28755",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28605",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28665",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28685",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4922"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=684685",
                    "reference_id": "684685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684685"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0616",
                    "reference_id": "RHSA-2011:0616",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0616"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1500-1/",
                    "reference_id": "USN-1500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935320?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.7.11-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.7.11-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4922"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xekx-jf8h-93hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57369?format=api",
            "vulnerability_id": "VCID-xgfd-ykfk-33dh",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877",
                    "reference_id": "1348877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2373"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33757?format=api",
            "vulnerability_id": "VCID-y3ke-yqy2-bbey",
            "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.pidgin.im/pidgin/main/rev/a8aef1d340f2"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0271.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68293",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68084",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68125",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68102",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68169",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68194",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6818",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68185",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68179",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68222",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68231",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68236",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68211",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68256",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18386"
                },
                {
                    "reference_url": "http://www.pidgin.im/news/security/?id=65",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pidgin.im/news/security/?id=65"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1746-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1746-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910039",
                    "reference_id": "910039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910039"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0271",
                    "reference_id": "CVE-2013-0271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0271"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-22",
                    "reference_id": "GLSA-201405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-22"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1746-1/",
                    "reference_id": "USN-1746-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1746-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935328?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.10.6-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.6-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-0271"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ke-yqy2-bbey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57365?format=api",
            "vulnerability_id": "VCID-ym5e-f9a1-ufdz",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87069",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87098",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87122",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87164",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87185",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87201",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8722",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869",
                    "reference_id": "1348869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2369"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34326?format=api",
            "vulnerability_id": "VCID-ypkz-jxvb-9fgd",
            "summary": "Multiple vulnerabilities have been discovered in Pidgin, leading to the\n    remote execution of arbitrary code, unauthorized information disclosure, or\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96229",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96237",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96248",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96257",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9626",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96265",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96267",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96276",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96281",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96283",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96284",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96285",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96287",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96295",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96301",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.25885",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96307",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500493",
                    "reference_id": "500493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500493"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200905-07",
                    "reference_id": "GLSA-200905-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200905-07"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200910-02",
                    "reference_id": "GLSA-200910-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200910-02"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar",
                    "reference_id": "OSVDB-54647;CVE-2009-2694;CVE-2009-1376",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9615.jar"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1059",
                    "reference_id": "RHSA-2009:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1060",
                    "reference_id": "RHSA-2009:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1060"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-1/",
                    "reference_id": "USN-781-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/781-2/",
                    "reference_id": "USN-781-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/781-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/886-1/",
                    "reference_id": "USN-886-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/886-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935307?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.5.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.5.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-1376"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ypkz-jxvb-9fgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57362?format=api",
            "vulnerability_id": "VCID-zamj-2ej2-qke5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862",
                    "reference_id": "1348862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2366"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79463?format=api",
            "vulnerability_id": "VCID-zhu6-8jrm-73bc",
            "summary": "pidgin: MITM attack possible on non-DNSSEC XMPP connections",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78925",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78908",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78932",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78938",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78962",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78947",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78937",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78966",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78963",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78993",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78999",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79015",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79031",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79052",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79065",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26491"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081227",
                    "reference_id": "2081227",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081227"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935332?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-26491"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu6-8jrm-73bc"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
}