Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/activemq@5.16.1-1?distro=trixie
purl pkg:deb/debian/activemq@5.16.1-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (32)
Vulnerability Summary Aliases
VCID-18k1-3h2s-8uex Apache ActiveMQ webconsole admin GUI is open to XSS In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. CVE-2020-1941
GHSA-cc94-3v9c-7rm8
VCID-3222-6uvd-7be5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Multiple cross-site scripting (XSS) vulnerabilities in the web based administration console in Apache ActiveMQ 5.x before 5.10.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. CVE-2014-8110
GHSA-9cvr-8xq4-2m73
VCID-37ws-cqf7-4udm Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. CVE-2020-13947
GHSA-66gw-ch5v-74v8
VCID-4up3-b171-g7aj Apache ActiveMQ default configuration subject to denial of service The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests. CVE-2012-6551
GHSA-34fp-xvxp-rg22
VCID-4x3q-h212-duaz XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. CVE-2014-3600
GHSA-4vhf-2hv7-8mrx
VCID-5kmj-whmc-4bfa When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. CVE-2017-15709
GHSA-7qm4-p377-fr2r
VCID-6fqa-fzda-x3ej Improper Authentication in Apache ActiveMQ and Apache Artemis The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password. CVE-2021-26117
GHSA-9mgm-gcq8-86wq
VCID-99na-8tpm-syh1 The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element. CVE-2016-0734
GHSA-w525-w93j-rxgm
VCID-9z4y-wq57-vyaf Code Injection In Apache ActiveMQ, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive. CVE-2019-0222
GHSA-jpv3-g4cc-6vfx
VCID-a3nb-p5p6-zbf7 Missing Authentication for Critical Function Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. CVE-2020-13920
GHSA-xgrx-xpv2-6vp4
VCID-a7j9-mzvg-cycr Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092. CVE-2013-1880
GHSA-c9gx-27hq-wcvj
VCID-anw6-f8f2-q3hx Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551. CVE-2012-6092
GHSA-rp9p-863f-9c4h
VCID-brq9-y937-8faz Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue. CVE-2016-0782
GHSA-8rcq-p4gh-vmj8
VCID-bws5-1j6c-g7f3 The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command. CVE-2014-3576
GHSA-3wfj-vh84-732p
VCID-cuhh-zgq5-n3gr Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests. CVE-2011-4905
GHSA-9wcx-326r-7j7w
VCID-f5x2-zvxa-yba5 False positive This advisory has been marked as a false positive. CVE-2023-46604
GHSA-crg9-44h2-xw35
VCID-fb7w-5fvt-zqe3 Cross-site Scripting An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the `queue.jsp` page of Apache ActiveMQ. CVE-2018-8006
GHSA-hvwm-2624-rp9x
VCID-gxt8-xcsg-3kes The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. CVE-2014-3612
GHSA-72m6-23ff-7q26
VCID-k4jb-36cp-1fc4 False positive This advisory has been marked as a false positive. CVE-2022-41678
GHSA-53v4-42fg-g287
VCID-nq1y-96n5-eugd The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. CVE-2016-3088
GHSA-rxqh-fc23-gxp2
VCID-pe37-xakm-3qb4 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13 CVE-2020-11998
GHSA-wqfh-9m4g-7x6x
VCID-pf5e-93cg-guav Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. CVE-2015-5254
GHSA-q9hr-3pg4-3jp4
VCID-q6zs-spcv-v7ey Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. CVE-2025-27533
GHSA-whxr-3p84-rf3c
VCID-rkj1-fqpn-cyfk The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types. CVE-2015-6524
GHSA-23cr-5hr4-rgwv
VCID-rsxq-hkds-vueh Improper Authentication in Apache ActiveMQ The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests. CVE-2013-3060
GHSA-p358-58jj-hp65
VCID-tyaw-6dpw-mudm Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4. Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue. CVE-2026-40046
GHSA-xvqc-pp94-fmpx
VCID-uc2f-713u-skcc Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message." CVE-2013-1879
GHSA-mfhr-3xmc-r2gg
VCID-uw15-q255-zbe8 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. CVE-2016-6810
GHSA-5jg4-p78r-p5j3
VCID-vbqu-ak2c-gqez Directory traversal vulnerability in the fileserver upload/download functionality for blob messages in Apache ActiveMQ 5.x before 5.11.2 for Windows allows remote attackers to create JSP files in arbitrary directories via unspecified vectors. CVE-2015-1830
GHSA-3v63-f83x-37x4
VCID-wema-7dnk-bkhy Apache ActiveMQ's default configuration doesn't secure the API web context In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API). To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement: <bean id="securityConstraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">   <property name="constraint" ref="securityConstraint" />   <property name="pathSpec" value="/" /> </bean> Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default. CVE-2024-32114
GHSA-gj5m-m88j-v7c3
VCID-xttf-9hx8-fbdb TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. CVE-2018-11775
GHSA-m9w8-v359-9ffr
VCID-y7sj-71h1-3qhr It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. CVE-2015-7559
GHSA-jvpp-hxjj-5ccc

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:24:48.532658+00:00 Debian Importer Fixing VCID-bws5-1j6c-g7f3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:15.594772+00:00 Debian Importer Fixing VCID-5kmj-whmc-4bfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:42.195183+00:00 Debian Importer Fixing VCID-rkj1-fqpn-cyfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:30.334864+00:00 Debian Importer Fixing VCID-nq1y-96n5-eugd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:52:01.933988+00:00 Debian Importer Fixing VCID-xttf-9hx8-fbdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:02.469181+00:00 Debian Importer Fixing VCID-pf5e-93cg-guav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:07.076439+00:00 Debian Importer Fixing VCID-tyaw-6dpw-mudm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:15.934844+00:00 Debian Importer Fixing VCID-a3nb-p5p6-zbf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:59:50.297080+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:00.265990+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:39.083513+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:39.357550+00:00 Debian Importer Fixing VCID-gxt8-xcsg-3kes https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:07.901669+00:00 Debian Importer Fixing VCID-9z4y-wq57-vyaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:01.365854+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:24.520709+00:00 Debian Importer Fixing VCID-k4jb-36cp-1fc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:43.985954+00:00 Debian Importer Fixing VCID-uw15-q255-zbe8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:03.467785+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:48.844104+00:00 Debian Importer Fixing VCID-fb7w-5fvt-zqe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:26.296582+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:52.758659+00:00 Debian Importer Fixing VCID-6fqa-fzda-x3ej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:05.812731+00:00 Debian Importer Fixing VCID-4x3q-h212-duaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:39.353939+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:20.844654+00:00 Debian Importer Fixing VCID-brq9-y937-8faz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:42.813209+00:00 Debian Importer Fixing VCID-f5x2-zvxa-yba5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:57.303915+00:00 Debian Importer Fixing VCID-37ws-cqf7-4udm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:12.876237+00:00 Debian Importer Fixing VCID-cuhh-zgq5-n3gr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:27.577892+00:00 Debian Importer Fixing VCID-18k1-3h2s-8uex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:16.624036+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:20.641573+00:00 Debian Importer Fixing VCID-y7sj-71h1-3qhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:58.137774+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:12.046377+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:15:08.173277+00:00 Debian Importer Fixing VCID-bws5-1j6c-g7f3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:42.434525+00:00 Debian Importer Fixing VCID-5kmj-whmc-4bfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:16.441164+00:00 Debian Importer Fixing VCID-rkj1-fqpn-cyfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:29.818525+00:00 Debian Importer Fixing VCID-nq1y-96n5-eugd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:57.229699+00:00 Debian Importer Fixing VCID-xttf-9hx8-fbdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:51.965165+00:00 Debian Importer Fixing VCID-pf5e-93cg-guav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:52.519558+00:00 Debian Importer Fixing VCID-a3nb-p5p6-zbf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:33.960281+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:37.928621+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:28.701680+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:37.732988+00:00 Debian Importer Fixing VCID-gxt8-xcsg-3kes https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:55.903474+00:00 Debian Importer Fixing VCID-9z4y-wq57-vyaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:21.295935+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:42.392787+00:00 Debian Importer Fixing VCID-k4jb-36cp-1fc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:18.183947+00:00 Debian Importer Fixing VCID-uw15-q255-zbe8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:13.880509+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:58.899025+00:00 Debian Importer Fixing VCID-fb7w-5fvt-zqe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:24.267446+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:00.320069+00:00 Debian Importer Fixing VCID-6fqa-fzda-x3ej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:22.641052+00:00 Debian Importer Fixing VCID-4x3q-h212-duaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:46.713708+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:01.821645+00:00 Debian Importer Fixing VCID-brq9-y937-8faz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.366056+00:00 Debian Importer Fixing VCID-tyaw-6dpw-mudm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:20.932458+00:00 Debian Importer Fixing VCID-f5x2-zvxa-yba5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:22.463604+00:00 Debian Importer Fixing VCID-37ws-cqf7-4udm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:23.891567+00:00 Debian Importer Fixing VCID-cuhh-zgq5-n3gr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:22.980267+00:00 Debian Importer Fixing VCID-18k1-3h2s-8uex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:30.944569+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:40.421695+00:00 Debian Importer Fixing VCID-y7sj-71h1-3qhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:40.796717+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:52.194407+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:19:31.545329+00:00 Debian Importer Fixing VCID-q6zs-spcv-v7ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:28.575754+00:00 Debian Importer Fixing VCID-bws5-1j6c-g7f3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:25.832896+00:00 Debian Importer Fixing VCID-5kmj-whmc-4bfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:04.068960+00:00 Debian Importer Fixing VCID-rkj1-fqpn-cyfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:57.075824+00:00 Debian Importer Fixing VCID-nq1y-96n5-eugd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:22.120827+00:00 Debian Importer Fixing VCID-xttf-9hx8-fbdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:13.210849+00:00 Debian Importer Fixing VCID-pf5e-93cg-guav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:39.321373+00:00 Debian Importer Fixing VCID-a3nb-p5p6-zbf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:22.480922+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:25.433586+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:14.486160+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:29.129163+00:00 Debian Importer Fixing VCID-gxt8-xcsg-3kes https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:45.205661+00:00 Debian Importer Fixing VCID-9z4y-wq57-vyaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:23.621110+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:46.561849+00:00 Debian Importer Fixing VCID-k4jb-36cp-1fc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:47.752534+00:00 Debian Importer Fixing VCID-uw15-q255-zbe8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:48.487863+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:36.843155+00:00 Debian Importer Fixing VCID-fb7w-5fvt-zqe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:09.251509+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:07.234219+00:00 Debian Importer Fixing VCID-6fqa-fzda-x3ej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:06.519759+00:00 Debian Importer Fixing VCID-4x3q-h212-duaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:53.354437+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:44.678444+00:00 Debian Importer Fixing VCID-brq9-y937-8faz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:33.521130+00:00 Debian Importer Fixing VCID-f5x2-zvxa-yba5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:00.303645+00:00 Debian Importer Fixing VCID-37ws-cqf7-4udm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:56.113086+00:00 Debian Importer Fixing VCID-cuhh-zgq5-n3gr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:53.679367+00:00 Debian Importer Fixing VCID-18k1-3h2s-8uex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:43.514658+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:52.875622+00:00 Debian Importer Fixing VCID-y7sj-71h1-3qhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:54.726594+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:35.772100+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.1.0