No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1284 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sat, 21 Mar 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the application by providing an excessively long username string during account creation. Attackers can input a buffer of 1000 characters in the username field and trigger a crash when joining a chat, causing the application to become unavailable. | |
| Title | Pidgin 2.13.0 Denial of Service via Malformed Username | |
| First Time appeared |
Pidgin
Pidgin pidgin |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:pidgin:pidgin:2.14.0:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.10:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.1:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.2:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.3:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.4:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.5:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.6:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.7:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.8:*:*:*:*:*:*:* cpe:2.3:a:pidgin:pidgin:2.14.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Pidgin
Pidgin pidgin |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-24T14:31:19.687Z
Reserved: 2026-03-21T12:23:17.461Z
Link: CVE-2019-25544
Updated: 2026-03-24T14:31:15.844Z
Status : Awaiting Analysis
Published: 2026-03-21T13:16:15.270
Modified: 2026-03-23T14:31:37.267
Link: CVE-2019-25544
OpenCVE Enrichment
Updated: 2026-03-23T09:49:35Z