Filtered by vendor Pidgin Subscriptions
Filtered by product Pidgin Subscriptions
Total 89 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2009-3085 2 Pidgin, Redhat 3 Libpurple, Pidgin, Enterprise Linux 2025-04-09 N/A
The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
CVE-2008-2957 2 Pidgin, Redhat 2 Pidgin, Enterprise Linux 2025-04-09 N/A
The UPnP functionality in Pidgin 2.0.0, and possibly other versions, allows remote attackers to trigger the download of arbitrary files and cause a denial of service (memory or disk consumption) via a UDP packet that specifies an arbitrary URL.
CVE-2009-1889 2 Pidgin, Redhat 2 Pidgin, Enterprise Linux 2025-04-09 N/A
The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets the ICQWebMessage message type as the ICQSMS message type, which allows remote attackers to cause a denial of service (application crash) via a crafted ICQ web message that triggers allocation of a large amount of memory.
CVE-2008-2927 3 Adium, Pidgin, Redhat 3 Adium, Pidgin, Enterprise Linux 2025-04-09 N/A
Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.
CVE-2008-2955 2 Pidgin, Redhat 2 Pidgin, Enterprise Linux 2025-04-09 N/A
Pidgin 2.4.1 allows remote attackers to cause a denial of service (crash) via a long filename that contains certain characters, as demonstrated using an MSN message that triggers the crash in the msn_slplink_process_msg function.
CVE-2022-26491 2 Debian, Pidgin 2 Debian Linux, Pidgin 2024-11-21 5.9 Medium
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
CVE-2017-2640 3 Debian, Pidgin, Redhat 8 Debian Linux, Pidgin, Enterprise Linux and 5 more 2024-11-21 N/A
An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
CVE-2016-1000030 2 Pidgin, Suse 2 Pidgin, Linux Enterprise Server 2024-11-21 N/A
Pidgin version <2.11.0 contains a vulnerability in X.509 Certificates imports specifically due to improper check of return values from gnutls_x509_crt_init() and gnutls_x509_crt_import() that can result in code execution. This attack appear to be exploitable via custom X.509 certificate from another client. This vulnerability appears to have been fixed in 2.11.0.
CVE-2012-1257 1 Pidgin 1 Pidgin 2024-11-21 5.5 Medium
Pidgin 2.10.0 uses DBUS for certain cleartext communication, which allows local users to obtain sensitive information via a dbus session monitor.