Lookup for vulnerable packages by Package URL.

GET /api/packages/935330?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "pidgin",
    "version": "2.11.0-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.12.0-1",
    "latest_non_vulnerable_version": "2.14.14-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57364?format=api",
            "vulnerability_id": "VCID-7fz8-kr7a-xqfb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2368.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90671",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90676",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90695",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90706",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90712",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90718",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90734",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90732",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90745",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9074",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90757",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90775",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90787",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867",
                    "reference_id": "1348867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348867"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2368"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fz8-kr7a-xqfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57371?format=api",
            "vulnerability_id": "VCID-7u2r-rnyz-uyd5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2375.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65102",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65152",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65143",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65223",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65211",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65183",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65218",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65228",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65225",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65237",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65217",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65264",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65309",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880",
                    "reference_id": "1348880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348880"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2375"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-rnyz-uyd5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57376?format=api",
            "vulnerability_id": "VCID-83az-td85-sudb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67371",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67393",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67459",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67446",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67449",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67461",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67441",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67444",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67488",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67527",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856",
                    "reference_id": "1348856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348856"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2380"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83az-td85-sudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57363?format=api",
            "vulnerability_id": "VCID-9btk-pnjv-1qgb",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2367.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83389",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8344",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83454",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83489",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83491",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83493",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83515",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83549",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83571",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8359",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865",
                    "reference_id": "1348865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348865"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2367"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9btk-pnjv-1qgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57366?format=api",
            "vulnerability_id": "VCID-9npz-w7g5-r3b5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2370.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871",
                    "reference_id": "1348871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348871"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2370"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9npz-w7g5-r3b5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57367?format=api",
            "vulnerability_id": "VCID-ca59-9ma2-nyek",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2371.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8759",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.876",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87613",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87636",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87653",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8766",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87661",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87658",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87682",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87681",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87696",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87711",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87729",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873",
                    "reference_id": "1348873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348873"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2371"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ca59-9ma2-nyek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57370?format=api",
            "vulnerability_id": "VCID-cd64-6y6b-rfa3",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2374.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86001",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86065",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.861",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8611",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86129",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86151",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02781",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86169",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878",
                    "reference_id": "1348878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348878"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2374"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cd64-6y6b-rfa3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57361?format=api",
            "vulnerability_id": "VCID-kt42-hfwm-7ubh",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2365.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87069",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87098",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87122",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87164",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87185",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87201",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8722",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858",
                    "reference_id": "1348858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348858"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2365"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt42-hfwm-7ubh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57368?format=api",
            "vulnerability_id": "VCID-myh5-wcpe-zbac",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78988",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78994",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79005",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79029",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7906",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79045",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79063",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79058",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79091",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79097",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79112",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79124",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79145",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79162",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876",
                    "reference_id": "1348876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348876"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2372"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myh5-wcpe-zbac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57372?format=api",
            "vulnerability_id": "VCID-nhj7-agfp-rue8",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91312",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91317",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91327",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91347",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91363",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91388",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91386",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91397",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91395",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91409",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91425",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91435",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848",
                    "reference_id": "1348848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348848"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2376"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhj7-agfp-rue8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57374?format=api",
            "vulnerability_id": "VCID-r5z8-wmea-a7by",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2378.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87253",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87271",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87278",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87299",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87311",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8733",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854",
                    "reference_id": "1348854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348854"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2378"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5z8-wmea-a7by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57373?format=api",
            "vulnerability_id": "VCID-uf3q-52zp-p3bk",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2377.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87253",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87271",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87278",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87281",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87299",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87311",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8733",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852",
                    "reference_id": "1348852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348852"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2377"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf3q-52zp-p3bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57360?format=api",
            "vulnerability_id": "VCID-vczt-sf85-uyfc",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72987",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72819",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72795",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72834",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72848",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72855",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.729",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72893",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72934",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72944",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72941",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72936",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00738",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72962",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000030"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882",
                    "reference_id": "1348882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348882"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000030"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vczt-sf85-uyfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57377?format=api",
            "vulnerability_id": "VCID-vmjg-nj4a-8uby",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4323.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83581",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83594",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8361",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83642",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83652",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83647",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83682",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83683",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83707",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83715",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8372",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83743",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8378",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857",
                    "reference_id": "1348857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348857"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-4323"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjg-nj4a-8uby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57369?format=api",
            "vulnerability_id": "VCID-xgfd-ykfk-33dh",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877",
                    "reference_id": "1348877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348877"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2373"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgfd-ykfk-33dh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57365?format=api",
            "vulnerability_id": "VCID-ym5e-f9a1-ufdz",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2369.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87069",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87098",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87122",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87139",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87164",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87185",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87201",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8722",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869",
                    "reference_id": "1348869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348869"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2369"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ym5e-f9a1-ufdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57362?format=api",
            "vulnerability_id": "VCID-zamj-2ej2-qke5",
            "summary": "Multiple vulnerabilities have been found in Pidgin, the worst of\n    which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2366.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83407",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83458",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83508",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8351",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83533",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8354",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83567",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862",
                    "reference_id": "1348862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348862"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-38",
                    "reference_id": "GLSA-201701-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3031-1/",
                    "reference_id": "USN-3031-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3031-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935330?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935301?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zhu6-8jrm-73bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935299?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935302?format=api",
                    "purl": "pkg:deb/debian/pidgin@2.14.14-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.14.14-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2366"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zamj-2ej2-qke5"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pidgin@2.11.0-1%3Fdistro=trixie"
}