This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Pidgin First view 2007-07-17
Product Pidgin Last view 2022-06-02
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:* 75
cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:* 75
cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:* 74
cpe:2.3:a:pidgin:pidgin:2.0.2:*:linux:*:*:*:*:* 74
cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:* 74
cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:* 74
cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:* 74
cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:-:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.0:32_bit:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.2:32_bit:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.4.1:32_bit:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:1.5.1:*:*:*:*:*:*:* 73
cpe:2.3:a:pidgin:pidgin:2.5.5:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.4:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.0:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.3:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.4.3:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.2:32_bit:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:* 72
cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:* 69
cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:* 68
cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:* 68
cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:* 67
cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:* 67
cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:* 66
cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:* 63
cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:* 63
cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:* 62
cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:* 61
cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:* 59
cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:* 58
cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:* 58
cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:* 57
cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:* 57
cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:* 56
cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:* 56

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.9 2022-06-02 CVE-2022-26491

An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.

5.5 2019-11-20 CVE-2012-1257

Pidgin 2.10.0 uses DBUS for certain cleartext communication, which allows local users to obtain sensitive information via a dbus session monitor.

9.8 2018-09-05 CVE-2016-1000030

Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.

9.8 2018-07-27 CVE-2017-2640

An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.

3.7 2017-01-06 CVE-2016-4323

A directory traversal exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an overwrite of files. A malicious server or someone with access to the network traffic can provide an invalid filename for a splash image triggering the vulnerability.

3.1 2017-01-06 CVE-2016-2380

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

8.1 2017-01-06 CVE-2016-2378

A buffer overflow vulnerability exists in the handling of the MXIT protocol Pidgin. Specially crafted data sent via the server could potentially result in a buffer overflow, potentially resulting in memory corruption. A malicious server or an unfiltered malicious user can send negative length values to trigger this vulnerability.

8.1 2017-01-06 CVE-2016-2377

A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent by the server could potentially result in an out-of-bounds write of one byte. A malicious server can send a negative content-length in response to a HTTP request triggering the vulnerability.

8.1 2017-01-06 CVE-2016-2376

A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network traffic can send an invalid size for a packet which will trigger a buffer overflow.

5.3 2017-01-06 CVE-2016-2375

An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.

8.1 2017-01-06 CVE-2016-2374

An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.

5.9 2017-01-06 CVE-2016-2373

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger this vulnerability.

5.9 2017-01-06 CVE-2016-2372

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.

8.1 2017-01-06 CVE-2016-2371

An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.

5.9 2017-01-06 CVE-2016-2370

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in an out-of-bounds read. A malicious server or man-in-the-middle attacker can send invalid data to trigger this vulnerability.

5.9 2017-01-06 CVE-2016-2369

A NULL pointer dereference vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a denial of service vulnerability. A malicious server can send a packet starting with a NULL byte triggering the vulnerability.

8.1 2017-01-06 CVE-2016-2368

Multiple memory corruption vulnerabilities exist in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could result in multiple buffer overflows, potentially resulting in code execution or memory disclosure.

5.9 2017-01-06 CVE-2016-2367

An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.

5.9 2017-01-06 CVE-2016-2366

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

5.9 2017-01-06 CVE-2016-2365

A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in a null pointer dereference. A malicious server or an attacker who intercepts the network traffic can send invalid data to trigger this vulnerability and cause a crash.

5 2014-10-29 CVE-2014-3698

The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.

6.4 2014-10-29 CVE-2014-3697

Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.

5 2014-10-29 CVE-2014-3696

nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.

5 2014-10-29 CVE-2014-3695

markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.

6.4 2014-10-29 CVE-2014-3694

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CWE : Common Weakness Enumeration

%idName
24% (20) CWE-20 Improper Input Validation
20% (17) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
13% (11) CWE-399 Resource Management Errors
9% (8) CWE-125 Out-of-bounds Read
7% (6) CWE-200 Information Exposure
6% (5) CWE-189 Numeric Errors
3% (3) CWE-310 Cryptographic Issues
3% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
2% (2) CWE-787 Out-of-bounds Write
2% (2) CWE-476 NULL Pointer Dereference
2% (2) CWE-295 Certificate Issues
1% (1) CWE-319 Cleartext Transmission of Sensitive Information
1% (1) CWE-264 Permissions, Privileges, and Access Controls

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-23 File System Function Injection, Content Based
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-76 Manipulating Input to File System Calls
CAPEC-78 Using Escaped Slashes in Alternate Encoding
CAPEC-79 Using Slashes in Alternate Encoding
CAPEC-139 Relative Path Traversal

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:18261 libpurple in Pidgin before 2.2.1 does not properly handle MSN nudge messages ...
oval:org.mitre.oval:def:18357 libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remo...
oval:org.mitre.oval:def:17522 USN-548-1 -- pidgin vulnerability
oval:org.mitre.oval:def:18050 Pidgin 2.4.1 allows remote attackers to cause a denial of service (crash) via...
oval:org.mitre.oval:def:10131 Pidgin 2.4.1 allows remote attackers to cause a denial of service (crash) via...
oval:org.mitre.oval:def:9076 The UPnP functionality in Pidgin 2.0.0, and possibly other versions, allows r...
oval:org.mitre.oval:def:17599 The UPnP functionality in Pidgin 2.0.0, and possibly other versions, allows r...
oval:org.mitre.oval:def:8328 DSA-1805 pidgin -- several vulnerabilities
oval:org.mitre.oval:def:8061 DSA-1610 gaim -- integer overflow
oval:org.mitre.oval:def:18744 DSA-1610-1 gaim - execution of arbitrary code
oval:org.mitre.oval:def:17972 Multiple integer overflows in the msn_slplink_process_msg functions in the MS...
oval:org.mitre.oval:def:17871 USN-675-2 -- gaim vulnerability
oval:org.mitre.oval:def:13618 DSA-1805-1 pidgin -- several
oval:org.mitre.oval:def:11695 Multiple integer overflows in the msn_slplink_process_msg functions in the MS...
oval:org.mitre.oval:def:22403 ELSA-2008:0584: pidgin security and bug fix update (Important)
oval:org.mitre.oval:def:29144 RHSA-2008:0584 -- pidgin security and bug fix update (Important)
oval:org.mitre.oval:def:18327 The NSS plugin in libpurple in Pidgin 2.4.3 does not verify SSL certificates,...
oval:org.mitre.oval:def:17826 USN-675-1 -- pidgin vulnerabilities
oval:org.mitre.oval:def:10979 The NSS plugin in libpurple in Pidgin 2.4.3 does not verify SSL certificates,...
oval:org.mitre.oval:def:22740 ELSA-2008:1023: pidgin security and bug fix update (Moderate)
oval:org.mitre.oval:def:29210 RHSA-2008:1023 -- pidgin security and bug fix update (Moderate)
oval:org.mitre.oval:def:9005 Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim...
oval:org.mitre.oval:def:17722 Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim...
oval:org.mitre.oval:def:18201 Buffer overflow in the decrypt_out function in Pidgin (formerly Gaim) before ...
oval:org.mitre.oval:def:11654 Buffer overflow in the decrypt_out function in Pidgin (formerly Gaim) before ...

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77751 Pidgin libpurple/protocols/silc/ops.c silc_channel_message() Function SILC Me...
77750 Pidgin XMPP Protocol Missing Field Video / Voice Chat Stanza Remote DoS
77749 Pidgin libpurple/protocols/oscar/family_feedbag.c Oscar Protocol Buddy Additi...
75994 Pidgin libpurple/protocols/silc/ops.c silc_private_message() Function Out-of-...
74921 Pidgin libpurple Yahoo! Plugin libymsg.c Malformed YMSG Message Handling Remo...
74827 Pidgin on Windows gtkutils.c file: URL Arbitrary Program Execution
74826 Pidgin libpurple MSN Protocol Plugin httpconn.c msn_httpconn_parse_data Funct...
74825 Pidgin libpurple IRC Protocol Plugin msgs.c irc_msg_who Function WHO Response...
70162 Pidgin MSN Direct Connection p2pv2 Packet Handling NULL Dereference Remote DoS
68773 Pidgin Multiple Protocol Plugin purple_base64_decode() Function Base64 Encode...
66506 Pidgin libpurple X-Status Message NULL Dereference DoS
64609 Pidgin libpurple slp.c msn_emoticon_msg Function SLP Message Custom Emoticon DoS
62440 Pidgin gtkimhtml.c Excessive Smiley CPU Consumption Remote DoS
62439 Pidgin XMPP Multi-user Chat Room Malformed Nickname Remote DoS
61626 Adium libpurple MSN protocol plugin slp.c Unspecified Memory Corruption
61625 Pidgin libpurple MSN protocol plugin slp.c Unspecified Memory Corruption
61421 Adium MSN Custom Smileys Feature Emoticon Request Traversal Arbitrary File Di...
61420 Pidgin MSN Custom Smileys Feature Emoticon Request Traversal Arbitrary File D...
59142 Adium libpurple OSCAR Protocol Plugin Crafted Contact-list Data Remote DoS
59141 Pidgin libpurple OSCAR Protocol Plugin Crafted Contact-list Data Remote DoS
57789 Pidgin Crafted IRC TOPIC Message NULL Dereference Remote DoS
57788 Pidgin MSN Protocol Plugin libpurple/protocols/msn/slp.c msn_slp_sip_recv Fun...
57787 Pidgin MSN Protocol Plugin libpurple/protocols/msn/slpcall.c msn_slp_process_...
57786 Pidgin XMPP Protocol Plugin Crafted Smiley Parsing Remote DoS
57522 Pidgin Yahoo Messenger Malformed Link Remote DoS

ExploitDB Exploits

id Description
11203 Pidgin MSN <= 2.6.4 File Download Vulnerability
9615 Pidgin MSN <= 2.5.8 Remote Code Execution Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-10-19 Name : Pidgin MXit Message Parsing Buffer Overflow Vulnerability (Windows)
File : nvt/gb_pidgin_mxit_msg_parsing_bof_vuln_win.nasl
2012-10-03 Name : Gentoo Security Advisory GLSA 201209-17 (pidgin)
File : nvt/glsa_201209_17.nasl
2012-09-10 Name : Slackware Advisory SSA:2012-195-02 pidgin
File : nvt/esoft_slk_ssa_2012_195_02.nasl
2012-08-30 Name : Fedora Update for pidgin FEDORA-2012-10287
File : nvt/gb_fedora_2012_10287_pidgin_fc17.nasl
2012-08-30 Name : Fedora Update for pidgin FEDORA-2012-8669
File : nvt/gb_fedora_2012_8669_pidgin_fc15.nasl
2012-08-30 Name : Fedora Update for pidgin FEDORA-2012-8687
File : nvt/gb_fedora_2012_8687_pidgin_fc17.nasl
2012-08-17 Name : Pidgin 'Libpurple' Cipher API Information Disclosure Vulnerability (Windows)
File : nvt/gb_pidgin_libpurple_cipher_api_info_disc_vuln_win.nasl
2012-08-10 Name : Debian Security Advisory DSA 2509-1 (pidgin)
File : nvt/deb_2509_1.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-11 (Pidgin)
File : nvt/glsa_201206_11.nasl
2012-08-03 Name : Mandriva Update for pidgin MDVSA-2012:029 (pidgin)
File : nvt/gb_mandriva_MDVSA_2012_029.nasl
2012-08-03 Name : Mandriva Update for pidgin MDVSA-2012:082 (pidgin)
File : nvt/gb_mandriva_MDVSA_2012_082.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1371 centos4 x86_64
File : nvt/gb_CESA-2011_1371_finch_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1371 centos5 x86_64
File : nvt/gb_CESA-2011_1371_finch_centos5_x86_64.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1820 centos4 x86_64
File : nvt/gb_CESA-2011_1820_finch_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1820 centos5 x86_64
File : nvt/gb_CESA-2011_1820_finch_centos5_x86_64.nasl
2012-07-30 Name : CentOS Update for finch CESA-2011:1821 centos6
File : nvt/gb_CESA-2011_1821_finch_centos6.nasl
2012-07-30 Name : CentOS Update for finch CESA-2012:1102 centos5
File : nvt/gb_CESA-2012_1102_finch_centos5.nasl
2012-07-30 Name : CentOS Update for finch CESA-2012:1102 centos6
File : nvt/gb_CESA-2012_1102_finch_centos6.nasl
2012-07-23 Name : RedHat Update for pidgin RHSA-2012:1102-01
File : nvt/gb_RHSA-2012_1102-01_pidgin.nasl
2012-07-16 Name : Fedora Update for pidgin FEDORA-2012-10294
File : nvt/gb_fedora_2012_10294_pidgin_fc16.nasl
2012-07-16 Name : Mandriva Update for pidgin MDVSA-2012:105 (pidgin)
File : nvt/gb_mandriva_MDVSA_2012_105.nasl
2012-07-10 Name : Ubuntu Update for pidgin USN-1500-1
File : nvt/gb_ubuntu_USN_1500_1.nasl
2012-07-09 Name : RedHat Update for pidgin RHSA-2011:1821-01
File : nvt/gb_RHSA-2011_1821-01_pidgin.nasl
2012-07-04 Name : Pidgin MSN and XMPP Denial of Service Vulnerabilities (Windows)
File : nvt/gb_pidgin_msn_n_xmpp_dos_vuln_win.nasl
2012-06-11 Name : Fedora Update for pidgin FEDORA-2012-8686
File : nvt/gb_fedora_2012_8686_pidgin_fc16.nasl

Snort® IPS/IDS

Date Description
2018-06-26 Pidgin MSN MSNP2P SLP message integer overflow attempt
RuleID : 46784 - Type : SERVER-OTHER - Revision : 1
2016-12-29 Pidgin MXIT file transfer length memory disclosure attempt
RuleID : 40876 - Type : SERVER-OTHER - Revision : 2
2016-06-07 Pidgin MXIT message length overflow attempt
RuleID : 39151 - Type : SERVER-OTHER - Revision : 3
2016-06-07 Pidgin MXIT negative message length underflow attempt
RuleID : 39150 - Type : SERVER-OTHER - Revision : 3
2016-05-12 Pidgin mxit_chunk_parse_cr out of bounds read attempt
RuleID : 38870 - Type : SERVER-OTHER - Revision : 3
2016-05-12 Pidgin mxit_chunk_parse_get_avatar out of bounds read attempt
RuleID : 38867 - Type : SERVER-OTHER - Revision : 3
2016-04-21 Pidgin mxit_parse_cmd_suggestcontacts out of bounds read attempt
RuleID : 38583 - Type : SERVER-OTHER - Revision : 3
2016-04-21 Pidgin multimx_message_received out of bounds read attempt
RuleID : 38578 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin MXIT protocol handling splash_remove directory traversal attempt
RuleID : 38551 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin MXIT protocol handling splash_remove directory traversal attempt
RuleID : 38550 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin mxit_parse_cmd_extprofile out of bounds read attempt
RuleID : 38549 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin MXIT protocol handling null pointer dereference attempt
RuleID : 38548 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin MXIT table markup command out of bounds read attempt
RuleID : 38547 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin MXIT table markup command out of bounds read attempt
RuleID : 38546 - Type : SERVER-OTHER - Revision : 3
2016-04-19 Pidgin mxit_update_contact out of bounds read attempt
RuleID : 38545 - Type : SERVER-OTHER - Revision : 3
2016-03-29 Pidgin MXIT is operation null pointer dereference attempt
RuleID : 38345 - Type : SERVER-OTHER - Revision : 3
2016-03-29 Pidgin MXIT is operation null pointer dereference attempt
RuleID : 38344 - Type : SERVER-OTHER - Revision : 3
2016-04-05 Pidgin MSN MSNP2P message integer overflow attempt
RuleID : 37960 - Type : SERVER-OTHER - Revision : 2
2015-10-01 TAR archive with absolute path detected
RuleID : 35827 - Type : FILE-OTHER - Revision : 2
2015-10-01 TAR archive with absolute path detected
RuleID : 35826 - Type : FILE-OTHER - Revision : 2
2014-01-10 multiple chat protocols link to local file attempt
RuleID : 28090 - Type : POLICY-SOCIAL - Revision : 3
2014-01-10 multiple chat protocols link to local file attempt
RuleID : 28089 - Type : POLICY-SOCIAL - Revision : 3
2014-01-10 Pidgin MXIT emoticon integer overflow attempt
RuleID : 28088 - Type : POLICY-SOCIAL - Revision : 4
2014-01-10 Pidgin MSN P2P message 64bit integer overflow attempt
RuleID : 15895 - Type : CHAT - Revision : 3
2014-01-10 Pidgin MSNP2P message integer overflow attempt
RuleID : 14263 - Type : POLICY-SOCIAL - Revision : 8

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-09-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1165.nasl - Type: ACT_GATHER_INFO
2017-09-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1166.nasl - Type: ACT_GATHER_INFO
2017-08-25 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2017-1854.nasl - Type: ACT_GATHER_INFO
2017-08-22 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20170801_pidgin_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2017-08-09 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2017-1854.nasl - Type: ACT_GATHER_INFO
2017-08-02 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-1854.nasl - Type: ACT_GATHER_INFO
2017-07-10 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2017-1131.nasl - Type: ACT_GATHER_INFO
2017-06-07 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201706-10.nasl - Type: ACT_GATHER_INFO
2017-04-12 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-457.nasl - Type: ACT_GATHER_INFO
2017-04-05 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-431.nasl - Type: ACT_GATHER_INFO
2017-04-03 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-410.nasl - Type: ACT_GATHER_INFO
2017-03-24 Name: An instant messaging client installed on the remote host is affected by a rem...
File: pidgin_2_12_0.nasl - Type: ACT_GATHER_INFO
2017-03-16 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2017-074-01.nasl - Type: ACT_GATHER_INFO
2017-03-15 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3231-1.nasl - Type: ACT_GATHER_INFO
2017-03-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-853.nasl - Type: ACT_GATHER_INFO
2017-03-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3806.nasl - Type: ACT_GATHER_INFO
2017-01-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-38.nasl - Type: ACT_GATHER_INFO
2016-07-18 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3620.nasl - Type: ACT_GATHER_INFO
2016-07-13 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3031-1.nasl - Type: ACT_GATHER_INFO
2016-07-05 Name: The remote Debian host is missing a security update.
File: debian_DLA-542.nasl - Type: ACT_GATHER_INFO
2016-06-23 Name: An instant messaging client installed on the remote host is affected by multi...
File: pidgin_2_11_0.nasl - Type: ACT_GATHER_INFO
2015-08-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201508-02.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_pidgin_20121009.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_pidgin_20130716.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_pidgin_20140731.nasl - Type: ACT_GATHER_INFO