{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","type":"deb","namespace":"debian","name":"pidgin","version":"2.10.8-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.10.10-1","latest_non_vulnerable_version":"2.14.14-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33761?format=json","vulnerability_id":"VCID-1p3d-b4v1-6fdg","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6477","reference_id":"","reference_type":"","scores":[{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.76992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77045","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77088","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77124","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77176","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77249","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056479","reference_id":"1056479","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056479"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6477"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3d-b4v1-6fdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33767?format=json","vulnerability_id":"VCID-1x1f-8ujk-53fw","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6484","reference_id":"","reference_type":"","scores":[{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.7164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.7167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71702","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71697","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71765","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71759","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71818","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057481","reference_id":"1057481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057481"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6484"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1f-8ujk-53fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33769?format=json","vulnerability_id":"VCID-3zuy-sufn-tfcw","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6487","reference_id":"","reference_type":"","scores":[{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88289","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88301","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88304","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88355","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88365","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03908","scoring_system":"epss","scoring_elements":"0.88406","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057489","reference_id":"1057489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057489"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://security.gentoo.org/glsa/201508-02","reference_id":"GLSA-201508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201508-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"},{"reference_url":"https://usn.ubuntu.com/2101-1/","reference_id":"USN-2101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2101-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6487"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zuy-sufn-tfcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33765?format=json","vulnerability_id":"VCID-562h-uev3-nqby","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6482","reference_id":"","reference_type":"","scores":[{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72969","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.7302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73065","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73105","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73099","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73109","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73132","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73187","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056913","reference_id":"1056913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056913"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6482"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-562h-uev3-nqby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33756?format=json","vulnerability_id":"VCID-5bxz-xddd-rudq","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6152","reference_id":"","reference_type":"","scores":[{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78652","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78415","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78452","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78496","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78586","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78602","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01147","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056473","reference_id":"1056473","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056473"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2012-6152"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxz-xddd-rudq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33766?format=json","vulnerability_id":"VCID-5k78-mks2-ckdk","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6483","reference_id":"","reference_type":"","scores":[{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75034","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75063","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.7504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75085","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75108","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.7512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.7511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75166","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75194","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75218","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.752","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75263","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056978","reference_id":"1056978","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056978"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6483"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5k78-mks2-ckdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33772?format=json","vulnerability_id":"VCID-6gvz-3ye8-zyen","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0020","reference_id":"","reference_type":"","scores":[{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.8763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87676","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87697","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87711","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87726","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87744","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87741","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87754","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03531","scoring_system":"epss","scoring_elements":"0.87786","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057502","reference_id":"1057502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057502"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0020"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvz-3ye8-zyen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33764?format=json","vulnerability_id":"VCID-b8zp-g4xa-t7ad","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6481","reference_id":"","reference_type":"","scores":[{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.76992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77045","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77088","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77124","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77176","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77185","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01006","scoring_system":"epss","scoring_elements":"0.77249","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056908","reference_id":"1056908","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056908"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6481"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zp-g4xa-t7ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33771?format=json","vulnerability_id":"VCID-ebg2-bj5n-tycb","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6490","reference_id":"","reference_type":"","scores":[{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97257","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.9727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.9728","published_at":"2026-04-18T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.9729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97299","published_at":"2026-05-09T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97305","published_at":"2026-05-11T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97309","published_at":"2026-05-12T12:55:00Z"},{"value":"0.38978","scoring_system":"epss","scoring_elements":"0.97318","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057498","reference_id":"1057498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057498"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6490"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebg2-bj5n-tycb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33763?format=json","vulnerability_id":"VCID-jb3a-ydyh-sfft","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6479","reference_id":"","reference_type":"","scores":[{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.7164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.7167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71702","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71706","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71697","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71765","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71759","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71818","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056907","reference_id":"1056907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056907"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6479"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jb3a-ydyh-sfft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33768?format=json","vulnerability_id":"VCID-stm8-xdkh-7bdf","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6485","reference_id":"","reference_type":"","scores":[{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71957","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71992","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.72022","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.72013","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.72071","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057484","reference_id":"1057484","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057484"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6485"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stm8-xdkh-7bdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33770?format=json","vulnerability_id":"VCID-tsth-71zg-n3g7","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6489","reference_id":"","reference_type":"","scores":[{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73217","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73349","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73376","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73399","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73358","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73382","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057490","reference_id":"1057490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1057490"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6489"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsth-71zg-n3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33762?format=json","vulnerability_id":"VCID-wprn-gtbj-ukgf","summary":"Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6478","reference_id":"","reference_type":"","scores":[{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86798","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.8682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86828","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86832","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86878","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86897","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86914","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.8691","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03105","scoring_system":"epss","scoring_elements":"0.86952","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056904","reference_id":"1056904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1056904"},{"reference_url":"https://security.gentoo.org/glsa/201405-22","reference_id":"GLSA-201405-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0139","reference_id":"RHSA-2014:0139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0139"},{"reference_url":"https://usn.ubuntu.com/2100-1/","reference_id":"USN-2100-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2100-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/935327?format=json","purl":"pkg:deb/debian/pidgin@2.10.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935301?format=json","purl":"pkg:deb/debian/pidgin@2.14.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zhu6-8jrm-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935299?format=json","purl":"pkg:deb/debian/pidgin@2.14.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/935302?format=json","purl":"pkg:deb/debian/pidgin@2.14.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6478"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wprn-gtbj-ukgf"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.10.8-1%3Fdistro=trixie"}