Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
Next non-vulnerable version 1:16.28.0~dfsg-0+deb11u5
Latest non-vulnerable version 1:22.9.0+dfsg+~cs6.16.60671434-1
Risk 4.4
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-r54j-ydjm-4uca
Aliases:
CVE-2024-57520
Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory (aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.
1:22.3.0~dfsg+~cs6.15.60671435-1
Affected by 0 other vulnerabilities.
1:22.8.2+dfsg+~cs6.15.60671435-1
Affected by 0 other vulnerabilities.
1:22.9.0+dfsg+~cs6.16.60671434-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (203)
Vulnerability Summary Aliases
VCID-111d-qj24-nyde Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code. CVE-2012-2415
VCID-1bxe-fg62-qugd The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package. CVE-2014-6609
VCID-1cad-s6nn-j7aw embedded prototype.js JavaScript hijacking CVE-2007-2383
VCID-1g96-fryn-9qak The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte. CVE-2007-2488
VCID-1qxc-4xk5-2feu Asterisk: Asterisk: Arbitrary code execution and file overwrite as root via insecure ast_coredumper file handling CVE-2026-23740
VCID-1t3u-22gq-qucr Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1. CVE-2024-35190
VCID-1u6r-4dzb-wfh2 Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-1507
VCID-1wuy-5w5r-bubj Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-1184
VCID-2qjc-yspn-xydj Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47780
VCID-2r38-yjx6-uuae security update CVE-2016-2232
VCID-2xc3-aqh8-cubn main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario. CVE-2019-15639
VCID-32hs-eqw2-1kf2 An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. CVE-2019-18790
VCID-34fv-tv5a-tkgw security update CVE-2022-23537
VCID-3gwr-t9bx-47cj asterisk: HTTP Manager ID is predictable (AST-2008-005) CVE-2008-1390
VCID-3jx3-v6c9-3be2 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-5641
VCID-3r26-8d9e-aqdm asterisk: remote crash in SIP channel driver (AST-2009-002) CVE-2009-0871
VCID-43ff-97jw-hkce Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution. CVE-2025-1131
VCID-4658-u85z-zqhh The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x before 12.3.1, when sub_min_expiry is set to zero, allows remote attackers to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to the device. CVE-2014-4045
VCID-48pt-6j6q-jbcn Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-23608
VCID-5211-bpr9-nqaf Multiple stack-based buffer overflows in the process_sdp function in chan_sip.c of the SIP channel T.38 SDP parser in Asterisk before 1.4.3 allow remote attackers to execute arbitrary code via a long (1) T38FaxRateManagement or (2) T38FaxUdpEC SDP parameter in an SIP message, as demonstrated using SIP INVITE. CVE-2007-2293
VCID-542z-gtvr-ykck Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code. CVE-2012-2416
VCID-5499-3dkq-9fc2 Multiple vulnerabilities have been found in Asterisk. CVE-2007-3764
VCID-55vv-7jsj-xqeh Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2023-49294
VCID-58np-gsxj-8yc4 The SIP channel driver (chan_sip) in Asterisk Open Source 1.4.x before 1.4.11, AsteriskNOW before beta7, Asterisk Appliance Developer Kit 0.x before 0.8.0, and s800i (Asterisk Appliance) 1.x before 1.0.3 allows remote attackers to cause a denial of service (memory exhaustion) via a SIP dialog that causes a large number of history entries to be created. CVE-2007-4455
VCID-5yue-52xt-ryhw An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands. CVE-2019-18610
VCID-63fe-saga-13ct Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 18.26.4 and 18.9-cert17, RTP UDP ports and internal resources can leak due to a lack of session termination. This could result in leaks and resource exhaustion. This issue has been patched in versions 18.26.4 and 18.9-cert17. CVE-2025-54995
VCID-67av-c7qh-5kek Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-3812
VCID-6c2h-e3rr-eyfw Asterisk is vulnerable to the remote execution of arbitrary code or a Denial of Service. CVE-2006-4345
VCID-6jv8-3wch-wfew security update CVE-2016-2316
VCID-6rhm-xrwe-x7af Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26717
VCID-6xqn-t8j4-skgs Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-2535
VCID-6yxw-veq3-eqgd Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function. CVE-2011-0495
VCID-77r2-q55r-wffw Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-2119
VCID-7kus-4n4f-myd1 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-26498
VCID-7m8s-6ydk-gbgr Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2021-37706
VCID-7ner-5xz7-93gz Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition. CVE-2018-12227
VCID-7pts-41xh-mbh4 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-4737
VCID-7pxs-dc7h-tkbs Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. CVE-2009-3727
VCID-7tfx-9358-gygx Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-1147
VCID-7tjs-ybpe-r7hg Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8417
VCID-81tr-5yzn-m7ap chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948. CVE-2012-3553
VCID-8kjy-xtm2-bqan Asterisk: Asterisk: Local file disclosure via unsafe XML parsing CVE-2026-23739
VCID-8mfb-mmaz-mfab reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header. CVE-2011-2216
VCID-8pdp-epea-juhj Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-26499
VCID-8qy8-gk53-eufc Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition. CVE-2017-16671
VCID-8shw-ev6h-dqgh Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8414
VCID-8sys-3sj7-c3h6 Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-21722
VCID-8yav-jpp1-rfbe security update CVE-2021-43299
VCID-917e-7kp2-y3hw res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference. CVE-2019-15297
VCID-986n-21m7-fuc8 main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts. CVE-2010-1224
VCID-9at6-bgzv-gue3 Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-39269
VCID-9f9j-z7y7-sffy Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2021-43845
VCID-9fz9-f74u-2yfe Asterisk is vulnerable to the remote execution of arbitrary code or a Denial of Service. CVE-2006-5445
VCID-9u4p-wdky-a3h1 Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue. CVE-2024-42365
VCID-9w61-sh1p-aqff Multiple vulnerabilities have been found in Asterisk. CVE-2007-3763
VCID-9xk8-m5c3-wud8 Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-2666
VCID-a2n5-xpy5-gyfh Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands. CVE-2017-14100
VCID-a442-jcja-zych Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-3263
VCID-a4na-u27r-sfc5 The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout. CVE-2014-4048
VCID-a5sa-32q2-s3he asterisk: Format String Vulnerability in Logger and Manager (AST-2008-004) CVE-2008-1333
VCID-a8uf-chxy-9udv The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population. CVE-2007-4280
VCID-adsx-448w-vbem Multiple vulnerabilities have been found in Asterisk. CVE-2007-4103
VCID-agez-w3xn-63bt Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2288
VCID-an47-cxfn-77e8 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-2685
VCID-ap3n-99gn-aucs A vulnerability has been discovered in PJSIP, which could lead to arbitrary code execution. CVE-2023-27585
VCID-apn8-j2e8-uka5 The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests. CVE-2011-4598
VCID-ay1n-kp3k-37db Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing. CVE-2014-8415
VCID-b1vq-vecs-pfev Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-3264
VCID-b4z5-5hbq-5ka8 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-42706
VCID-bbhx-pe8h-fubn Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8418
VCID-bk8r-brkr-bqc6 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2023-49786
VCID-bknu-abgc-bugw Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2023-37457
VCID-bv3b-3h5a-s7ez Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-1183
VCID-byqv-c5jp-6ybg security update CVE-2021-43301
VCID-c4n3-bd3z-qfbw Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2009-0041
VCID-c765-b3fs-nbdu Multiple buffer overflows in the voicemail functionality in Asterisk 1.4.x before 1.4.13, when using IMAP storage, might allow (1) remote attackers to execute arbitrary code via a long combination of Content-type and Content-description headers, or (2) local users to execute arbitrary code via a long combination of astspooldir, voicemail context, and voicemail mailbox fields. NOTE: vector 2 requires write access to Asterisk configuration files. CVE-2007-5358
VCID-cupt-538a-z3fp Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-37325
VCID-cvp4-5uvw-xff2 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-3863
VCID-czy4-hnuj-fbgx Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-1174
VCID-d791-zjab-jfh1 The SIP channel driver in Asterisk Open Source 1.4.x before 1.4.17, Business Edition before C.1.0-beta8, AsteriskNOW before beta7, Appliance Developer Kit before Asterisk 1.4 revision 95946, and Appliance s800i 1.0.x before 1.0.3.4 allows remote attackers to cause a denial of service (daemon crash) via a BYE message with an Also (Also transfer) header, which triggers a NULL pointer dereference. CVE-2008-0095
VCID-d8sn-7zbc-4bhy Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code. CVE-2012-2414
VCID-ddpb-zwva-rfc5 Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-21723
VCID-dmv1-4jgk-e3cq Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2287
VCID-dpra-jbea-4fcy Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands. CVE-2017-14603
VCID-e1yx-dxa6-1bba Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact. CVE-2011-3389
VCID-e3vd-dhyn-1qfa Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length. CVE-2006-1827
VCID-e7t9-pdx7-5kgm Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-1175
VCID-ebcm-kjvz-73cz Asterisk Open Source 12.x before 12.8.1 and 13.x before 13.1.1, when using the PJSIP channel driver, does not properly reclaim RTP ports, which allows remote authenticated users to cause a denial of service (file descriptor consumption) via an SDP offer containing only incompatible codecs. CVE-2015-1558
VCID-ed6c-6srd-67f6 Buffer overflow in the get_msg_text of chan_sip.c in the Session Initiation Protocol (SIP) protocol implementation for Asterisk releases before August 15, 2003, allows remote attackers to execute arbitrary code via certain (1) MESSAGE or (2) INFO requests. CVE-2003-0761
VCID-edp8-yh2h-xuck Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-9374
VCID-ehd7-39bz-2ybk Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-5976
VCID-ehx4-qzgr-qbd9 Multiple vulnerabilities have been discovered in Asterisk, the worst of which could allow privileged users to execute arbitrary system shell commands. CVE-2014-4047
VCID-ennr-ek9z-a7db The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available. CVE-2010-0685
VCID-epzp-dpmr-33df Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2021-32686
VCID-eund-5mfa-9kbn security update CVE-2017-17090
VCID-f1y5-37zk-x3ey The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules. CVE-2014-8413
VCID-f4br-7sgk-27cf Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service. CVE-2014-6610
VCID-f5qc-tsbr-1yap Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2021-43804
VCID-fdpu-1891-q3a6 asterisk allows calls on prohibited networks CVE-2009-3723
VCID-fjzf-5rtw-rqfj Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26906
VCID-fndq-j9d2-afed A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack. CVE-2017-17664
VCID-fz7z-xttk-13by security update CVE-2016-7551
VCID-fzs1-dj22-7fff Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. CVE-2009-2726
VCID-g6cn-x656-5fcw Asterisk is vulnerable to the remote execution of arbitrary code or a Denial of Service. CVE-2006-4346
VCID-ge7t-fqyp-vyhz Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26713
VCID-ggu9-8qd1-4ffx security update CVE-2018-7286
VCID-gkcp-1zz6-tfb5 A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. CVE-2020-28327
VCID-grs7-fu68-2ff3 Asterisk contains a bug in the IAX2 channel driver making it vulnerable to the remote execution of arbitrary code. CVE-2006-2898
VCID-gy3u-c6dc-sbbn An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal. CVE-2024-53566
VCID-h193-vjhb-j3a3 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-32558
VCID-h52b-ubb6-byh1 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-2686
VCID-h8nm-exgj-xybc Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. CVE-2009-4055
VCID-hj93-7z1r-vkfk Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24763
VCID-huqt-1fv6-67cz An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or when a SIP 181 response is received that contains a tel-uri in the Diversion header. CVE-2020-35652
VCID-hvmt-7qk8-wqh1 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-5642
VCID-j3wr-j8e1-tbeq Directory traversal vulnerability in vmail.cgi in Asterisk 1.0.9 through 1.2.0-beta1 allows remote attackers to access WAV files via a .. (dot dot) in the folder parameter. CVE-2005-3559
VCID-jez3-sw2r-r3d6 An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs. CVE-2016-9937
VCID-jwaj-b8n5-bbcx asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote). CVE-2016-7550
VCID-k1zu-wpsb-wyh3 A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop). CVE-2017-9358
VCID-kby8-5rnd-fffs Asterisk is vulnerable to Denial of Service in the SIP channel. CVE-2007-1306
VCID-kdex-mwf6-13br Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-2186
VCID-m27d-dqzg-w7gr Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action. CVE-2017-7617
VCID-m3gv-mmcp-t7fz Asterisk: Remote DoS via specially-crafted FaxMaxDatagram SDP packets (AST-2010-001) CVE-2010-0441
VCID-m9wv-atrb-c3ac The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port. CVE-2007-3765
VCID-mcd2-e66p-j3b7 The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash). CVE-2007-2297
VCID-mcfv-fuk8-cqaq Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8412
VCID-mmng-tcuj-wkhu An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable. CVE-2018-12228
VCID-mmqp-yesh-83c1 Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-2536
VCID-n6mj-v1nc-hke9 Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24793
VCID-nbq8-qr83-qbh7 Stack-based buffer overflow in the function that parses commands in Asterisk 1.0.7, when the 'write = command' option is enabled, allows remote attackers to execute arbitrary code via a command that has two double quotes followed by a tab character. CVE-2005-2081
VCID-nf5d-nejq-mkd9 security update CVE-2021-43303
VCID-ngds-k5mh-t3ae Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-31031
VCID-nzu7-8h1d-mbbw The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests. CVE-2011-4597
VCID-p5vz-kq6m-63dd Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition. CVE-2018-17281
VCID-p6k6-8gxf-sydp Multiple vulnerabilities have been found in Asterisk allowing for SQL injection, session hijacking and unauthorized usage. CVE-2007-6430
VCID-phb4-xaj7-byg2 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. CVE-2026-23741
VCID-pjwr-x9hp-g7dk Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an "invalid/corrupted" MIME body, which triggers a crash when the recipient listens to voicemail. CVE-2007-4521
VCID-pmte-bc34-pfcv security update CVE-2023-38703
VCID-psbg-wv2x-w7ba security update CVE-2022-23547
VCID-q3py-mykt-4kax Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution. CVE-2025-49832
VCID-q6w8-pqsz-7ud4 The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form. CVE-2007-1595
VCID-qcqe-63ev-f7gv Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations. CVE-2024-42491
VCID-qksp-5hqu-7qad An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation. CVE-2019-7251
VCID-qpwr-bqps-77cc Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code. CVE-2012-2947
VCID-qsqz-g9fv-6bgg Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-2264
VCID-r1sd-avzd-d7gv Asterisk is vulnerable to the remote execution of arbitrary code or a Denial of Service. CVE-2006-5444
VCID-r6s6-y3q8-vydc Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands. CVE-2017-14099
VCID-r8b9-jcqa-xyb2 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2020-35776
VCID-rb5h-mvxt-7qhv security update CVE-2015-3008
VCID-rb9n-t857-1uac Multiple vulnerabilities have been found in Asterisk allowing for SQL injection, session hijacking and unauthorized usage. CVE-2008-1332
VCID-re5z-334n-e7a2 Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-1897
VCID-rn9b-2scp-byf5 asterisk: remote DoS on receipt of malformed RTP text frames CVE-2009-2651
VCID-rwug-45gf-s3bz security update CVE-2018-7284
VCID-s3p6-93jg-p7c3 Multiple vulnerabilities have been discovered in Asterisk, the worst of which could allow privileged users to execute arbitrary system shell commands. CVE-2014-4046
VCID-s7qt-9z8z-y7bx Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-2665
VCID-sb1c-cz2g-dycu Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-7100
VCID-sqgd-ykvk-2qay Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up. CVE-2014-8416
VCID-sw4t-1yct-ffbd Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code. CVE-2012-2948
VCID-tekr-xkck-pkfu Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. CVE-2008-7220
VCID-tmja-qaa1-8kex Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution. CVE-2025-57767
VCID-tqwd-ffwc-mkd1 Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24792
VCID-ttmk-fs9h-hufh An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop). CVE-2018-7287
VCID-tw8d-u845-r3dq Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24754
VCID-tyh4-14zn-63ez An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur. CVE-2020-28242
VCID-u4gv-ss9p-sqe9 Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands. CVE-2017-14098
VCID-u91b-9huy-43hn Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47779
VCID-u99q-b5ug-jyd5 Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-3903
VCID-u9xx-wevm-ufdh Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-2529
VCID-urhv-6gz3-u7fr Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-1599
VCID-v7ev-jtsg-cqdg security update CVE-2021-46837
VCID-vwf4-v4ve-4yfh Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-39244
VCID-w7ce-jd16-xbbs Multiple vulnerabilities have been found in Asterisk allowing for SQL injection, session hijacking and unauthorized usage. CVE-2007-6170
VCID-w94b-nwsf-wkg3 The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends "early audio" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message. CVE-2008-1923
VCID-w9ce-m3x8-n3ak Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24786
VCID-w9e8-ekah-wfg2 Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition. CVE-2017-17850
VCID-wbrs-de57-1bd9 Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2289
VCID-wfgw-5dme-yfan Multiple vulnerabilities have been found in Asterisk. CVE-2007-3762
VCID-wsh5-yefr-d7ad Asterisk is vulnerable to two Denial of Service issues in the SIP channel. CVE-2007-1561
VCID-wz3z-sq5y-pbd6 SQL injection vulnerability in the Postgres Realtime Engine (res_config_pgsql) in Asterisk 1.4.x before 1.4.15 and C.x before C.1.0-beta6 allows remote attackers to execute arbitrary SQL commands via unknown vectors. CVE-2007-6171
VCID-x2gp-mft6-1yhy An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration). CVE-2019-13161
VCID-xbe4-uvqu-6kf7 Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message. CVE-2019-12827
VCID-xcpx-unz5-gqbp Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length. CVE-2018-19278
VCID-xqg6-5cn7-4bct Multiple vulnerabilities in Asterisk might allow unauthenticated remote attackers to execute arbitrary code. CVE-2011-4063
VCID-xr4a-tmxe-8fcd Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26712
VCID-xt5z-2sgq-4fc4 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2012-5977
VCID-y3vu-z8tx-tubb An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940. CVE-2019-18976
VCID-y6sx-xqsh-wbcg Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24764
VCID-ytty-tbs1-ffc7 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. CVE-2026-23738
VCID-yx1m-ayfg-ryc3 security update CVE-2021-43300
VCID-yyjj-7dwq-nueq A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist. CVE-2018-7285
VCID-z3fq-m317-ckb8 Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-26651
VCID-zabf-adce-sqde Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2022-42705
VCID-zbwp-f5me-jqhu Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2286
VCID-zgqk-kej8-qkhg A vulnerability in Asterisk could allow a remote attacker to cause a Denial of Service condition. CVE-2012-0885
VCID-zkuy-4hqk-vkca Multiple vulnerabilities have been found in Asterisk allowing for Denial of Service and username disclosure. CVE-2008-5558
VCID-zn8s-5jkp-bkbr The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference. CVE-2007-2294
VCID-zr2v-gabj-8kak asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002) CVE-2008-1289
VCID-ztn6-xpxt-vkhb SQL injection vulnerability in the Call Detail Record (CDR) logging functionality for Asterisk allows remote attackers to execute arbitrary SQL via a CallerID string. CVE-2003-0779
VCID-zv1p-p8tb-dqhm Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-31878
VCID-zvpn-2gds-9yc4 Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. CVE-2009-2346
VCID-zvwt-wp8r-1qhx Multiple vulnerabilities have been found in Asterisk, the worst of which could result in a Denial of Service condition. CVE-2017-16672
VCID-zxkf-88k3-3qcn security update CVE-2021-43302
VCID-zzpx-gwmv-sfbz An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for whitespace when attempting to strip the content between a SIP header name and a colon character. Rather than following RFC 3261 and stripping only spaces and horizontal tabs, Asterisk treats any non-printable ASCII character as if it were whitespace. This means that headers such as Contact\x01: will be seen as a valid Contact header. This mostly does not pose a problem until Asterisk is placed in tandem with an authenticating SIP proxy. In such a case, a crafty combination of valid and invalid To headers can cause a proxy to allow an INVITE request into Asterisk without authentication since it believes the request is an in-dialog request. However, because of the bug described above, the request will look like an out-of-dialog request to Asterisk. Asterisk will then process the request as a new call. The result is that Asterisk can process calls from unvetted sources without any authentication. If you do not use a proxy for authentication, then this issue does not affect you. If your proxy is dialog-aware (meaning that the proxy keeps track of what dialogs are currently valid), then this issue does not affect you. If you use chan_pjsip instead of chan_sip, then this issue does not affect you. CVE-2016-9938

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:19:00.004011+00:00 Debian Importer Fixing VCID-rb5h-mvxt-7qhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:46.323575+00:00 Debian Importer Fixing VCID-ehd7-39bz-2ybk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:29.040037+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:07:11.559824+00:00 Debian Importer Fixing VCID-rwug-45gf-s3bz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:17.139905+00:00 Debian Importer Fixing VCID-d791-zjab-jfh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:00:39.756883+00:00 Debian Importer Fixing VCID-6rhm-xrwe-x7af https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:56:08.224151+00:00 Debian Importer Fixing VCID-58np-gsxj-8yc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:02.315982+00:00 Debian Importer Fixing VCID-m3gv-mmcp-t7fz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:26.494463+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:14.661432+00:00 Debian Importer Fixing VCID-w9e8-ekah-wfg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:05.000231+00:00 Debian Importer Fixing VCID-k1zu-wpsb-wyh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:34:08.046327+00:00 Debian Importer Fixing VCID-e7t9-pdx7-5kgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:32.423896+00:00 Debian Importer Fixing VCID-wfgw-5dme-yfan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:21.799102+00:00 Debian Importer Fixing VCID-67av-c7qh-5kek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:22:11.897934+00:00 Debian Importer Fixing VCID-5211-bpr9-nqaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:21:44.959017+00:00 Debian Importer Fixing VCID-6xqn-t8j4-skgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:04.546483+00:00 Debian Importer Fixing VCID-epzp-dpmr-33df https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:51.890127+00:00 Debian Importer Fixing VCID-urhv-6gz3-u7fr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:58.082382+00:00 Debian Importer Fixing VCID-p5vz-kq6m-63dd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:04.622943+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:45.114951+00:00 Debian Importer Fixing VCID-2r38-yjx6-uuae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:12.549720+00:00 Debian Importer Fixing VCID-y3vu-z8tx-tubb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:00.608545+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:56.449702+00:00 Debian Importer Fixing VCID-gkcp-1zz6-tfb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:47.761242+00:00 Debian Importer Fixing VCID-ddpb-zwva-rfc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:57.595498+00:00 Debian Importer Fixing VCID-apn8-j2e8-uka5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:55.016278+00:00 Debian Importer Fixing VCID-u99q-b5ug-jyd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:21.108075+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:37.855963+00:00 Debian Importer Fixing VCID-542z-gtvr-ykck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:45:50.062206+00:00 Debian Importer Fixing VCID-dmv1-4jgk-e3cq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:15.854013+00:00 Debian Importer Fixing VCID-8yav-jpp1-rfbe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:34.080657+00:00 Debian Importer Fixing VCID-cvp4-5uvw-xff2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:41.285564+00:00 Debian Importer Fixing VCID-fjzf-5rtw-rqfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:31.722503+00:00 Debian Importer Fixing VCID-rn9b-2scp-byf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:41.604982+00:00 Debian Importer Fixing VCID-w94b-nwsf-wkg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:29.811468+00:00 Debian Importer Fixing VCID-9at6-bgzv-gue3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:22.966110+00:00 Debian Importer Fixing VCID-sw4t-1yct-ffbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:21:48.609268+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:17:18.367234+00:00 Debian Importer Fixing VCID-8qy8-gk53-eufc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:37.082137+00:00 Debian Importer Fixing VCID-h52b-ubb6-byh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:35.232101+00:00 Debian Importer Fixing VCID-tqwd-ffwc-mkd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:51.663982+00:00 Debian Importer Fixing VCID-fzs1-dj22-7fff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:37.842730+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:18.869897+00:00 Debian Importer Fixing VCID-6yxw-veq3-eqgd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:05.832698+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:07.788198+00:00 Debian Importer Fixing VCID-u4gv-ss9p-sqe9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:57.518406+00:00 Debian Importer Fixing VCID-77r2-q55r-wffw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:52.809887+00:00 Debian Importer Fixing VCID-mmqp-yesh-83c1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:52.049297+00:00 Debian Importer Fixing VCID-u9xx-wevm-ufdh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:47.430922+00:00 Debian Importer Fixing VCID-qpwr-bqps-77cc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:36.956354+00:00 Debian Importer Fixing VCID-f4br-7sgk-27cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:07.533350+00:00 Debian Importer Fixing VCID-y6sx-xqsh-wbcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:31.539228+00:00 Debian Importer Fixing VCID-9xk8-m5c3-wud8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:02.663527+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:38.316775+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:32.320674+00:00 Debian Importer Fixing VCID-kdex-mwf6-13br https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:10.425737+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:54.438377+00:00 Debian Importer Fixing VCID-p6k6-8gxf-sydp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:32.931891+00:00 Debian Importer Fixing VCID-9fz9-f74u-2yfe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:20.708459+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:41.353587+00:00 Debian Importer Fixing VCID-r8b9-jcqa-xyb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:08.231156+00:00 Debian Importer Fixing VCID-9w61-sh1p-aqff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:41.365166+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:21.333945+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:23.721065+00:00 Debian Importer Fixing VCID-nzu7-8h1d-mbbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:48.921798+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:26.731697+00:00 Debian Importer Fixing VCID-ehx4-qzgr-qbd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:22.573867+00:00 Debian Importer Fixing VCID-nf5d-nejq-mkd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:12.738128+00:00 Debian Importer Fixing VCID-48pt-6j6q-jbcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:56.522266+00:00 Debian Importer Fixing VCID-b1vq-vecs-pfev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:10.903217+00:00 Debian Importer Fixing VCID-m27d-dqzg-w7gr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:42.395199+00:00 Debian Importer Fixing VCID-zvpn-2gds-9yc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:54.812120+00:00 Debian Importer Fixing VCID-e1yx-dxa6-1bba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:44.641698+00:00 Debian Importer Fixing VCID-re5z-334n-e7a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:28.060847+00:00 Debian Importer Fixing VCID-eund-5mfa-9kbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:13.978635+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:58.580747+00:00 Debian Importer Fixing VCID-pmte-bc34-pfcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:55.280178+00:00 Debian Importer Fixing VCID-r1sd-avzd-d7gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:16.435564+00:00 Debian Importer Fixing VCID-qksp-5hqu-7qad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:20.727455+00:00 Debian Importer Fixing VCID-6c2h-e3rr-eyfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:41.176842+00:00 Debian Importer Fixing VCID-v7ev-jtsg-cqdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:35.140973+00:00 Debian Importer Fixing VCID-1g96-fryn-9qak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:00.841785+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:31.794265+00:00 Debian Importer Fixing VCID-xt5z-2sgq-4fc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:41.729424+00:00 Debian Importer Fixing VCID-3gwr-t9bx-47cj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:59.331423+00:00 Debian Importer Fixing VCID-wsh5-yefr-d7ad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:39.961067+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:04.260343+00:00 Debian Importer Fixing VCID-zn8s-5jkp-bkbr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:50.492021+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:32.421063+00:00 Debian Importer Fixing VCID-8mfb-mmaz-mfab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:49.177346+00:00 Debian Importer Fixing VCID-9u4p-wdky-a3h1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:18.212167+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:50.938375+00:00 Debian Importer Fixing VCID-q6w8-pqsz-7ud4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:55.034506+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:55.712513+00:00 Debian Importer Fixing VCID-d8sn-7zbc-4bhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:52.110269+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:18.886125+00:00 Debian Importer Fixing VCID-7m8s-6ydk-gbgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:10.714183+00:00 Debian Importer Fixing VCID-111d-qj24-nyde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:28.187390+00:00 Debian Importer Fixing VCID-ap3n-99gn-aucs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:10.369739+00:00 Debian Importer Fixing VCID-zvwt-wp8r-1qhx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:02.361712+00:00 Debian Importer Fixing VCID-qsqz-g9fv-6bgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:23.000893+00:00 Debian Importer Fixing VCID-rb9n-t857-1uac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:34.768922+00:00 Debian Importer Fixing VCID-7tfx-9358-gygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:51.604640+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:24.767327+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:05.144989+00:00 Debian Importer Fixing VCID-tyh4-14zn-63ez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:25.907273+00:00 Debian Importer Fixing VCID-zgqk-kej8-qkhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:59.732834+00:00 Debian Importer Fixing VCID-ztn6-xpxt-vkhb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:33.185167+00:00 Debian Importer Fixing VCID-dpra-jbea-4fcy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:09.252310+00:00 Debian Importer Fixing VCID-x2gp-mft6-1yhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:05.838417+00:00 Debian Importer Fixing VCID-63fe-saga-13ct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:33.103622+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:27.460211+00:00 Debian Importer Fixing VCID-xbe4-uvqu-6kf7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:11.919231+00:00 Debian Importer Fixing VCID-h8nm-exgj-xybc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:46.056083+00:00 Debian Importer Fixing VCID-a2n5-xpy5-gyfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:09.031363+00:00 Debian Importer Fixing VCID-fz7z-xttk-13by https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:58.923505+00:00 Debian Importer Fixing VCID-adsx-448w-vbem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:34.135196+00:00 Debian Importer Fixing VCID-h193-vjhb-j3a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:31.355245+00:00 Debian Importer Fixing VCID-hj93-7z1r-vkfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:23.600756+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:21.512536+00:00 Debian Importer Fixing VCID-1u6r-4dzb-wfh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:01.649551+00:00 Debian Importer Fixing VCID-3jx3-v6c9-3be2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:11.799558+00:00 Debian Importer Fixing VCID-c765-b3fs-nbdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:03.131784+00:00 Debian Importer Fixing VCID-fdpu-1891-q3a6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:39.554509+00:00 Debian Importer Fixing VCID-kby8-5rnd-fffs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:08.298983+00:00 Debian Importer Fixing VCID-w9ce-m3x8-n3ak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:37.677104+00:00 Debian Importer Fixing VCID-bk8r-brkr-bqc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:25.478775+00:00 Debian Importer Fixing VCID-5499-3dkq-9fc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:19.013445+00:00 Debian Importer Fixing VCID-zkuy-4hqk-vkca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:13.965221+00:00 Debian Importer Fixing VCID-w7ce-jd16-xbbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:25.866736+00:00 Debian Importer Fixing VCID-43ff-97jw-hkce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:21.091834+00:00 Debian Importer Fixing VCID-fndq-j9d2-afed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:17.738844+00:00 Debian Importer Fixing VCID-ggu9-8qd1-4ffx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:07.889891+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:53.922493+00:00 Debian Importer Fixing VCID-z3fq-m317-ckb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:13.181659+00:00 Debian Importer Fixing VCID-gy3u-c6dc-sbbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:51.539621+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:54.924316+00:00 Debian Importer Fixing VCID-s7qt-9z8z-y7bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:20.873656+00:00 Debian Importer Fixing VCID-g6cn-x656-5fcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:03.484576+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:55.584879+00:00 Debian Importer Fixing VCID-grs7-fu68-2ff3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:27.139542+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:02.470549+00:00 Debian Importer Fixing VCID-nbq8-qr83-qbh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:50.965265+00:00 Debian Importer Fixing VCID-7pxs-dc7h-tkbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:34.304009+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:19.252941+00:00 Debian Importer Fixing VCID-n6mj-v1nc-hke9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:15.409786+00:00 Debian Importer Fixing VCID-czy4-hnuj-fbgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:42.890779+00:00 Debian Importer Fixing VCID-mcd2-e66p-j3b7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:42.077387+00:00 Debian Importer Fixing VCID-b4z5-5hbq-5ka8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:39.725242+00:00 Debian Importer Fixing VCID-j3wr-j8e1-tbeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:25.052005+00:00 Debian Importer Fixing VCID-a5sa-32q2-s3he https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:51.243554+00:00 Debian Importer Fixing VCID-8pdp-epea-juhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:47.409902+00:00 Debian Importer Fixing VCID-ngds-k5mh-t3ae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:02.849532+00:00 Debian Importer Fixing VCID-cupt-538a-z3fp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:05.078523+00:00 Debian Importer Fixing VCID-a442-jcja-zych https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:20.326225+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:29.599034+00:00 Debian Importer Fixing VCID-bv3b-3h5a-s7ez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:29.572481+00:00 Debian Importer Fixing VCID-s3p6-93jg-p7c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:09.986469+00:00 Debian Importer Fixing VCID-yx1m-ayfg-ryc3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:16.469752+00:00 Debian Importer Fixing VCID-e3vd-dhyn-1qfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:43.611782+00:00 Debian Importer Fixing VCID-wz3z-sq5y-pbd6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:39.443024+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:12.412365+00:00 Debian Importer Fixing VCID-34fv-tv5a-tkgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:59.758981+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:54.841999+00:00 Debian Importer Fixing VCID-7pts-41xh-mbh4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:46.101507+00:00 Debian Importer Fixing VCID-6jv8-3wch-wfew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:22.281978+00:00 Debian Importer Fixing VCID-jwaj-b8n5-bbcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:52.953794+00:00 Debian Importer Fixing VCID-r6s6-y3q8-vydc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:23.046431+00:00 Debian Importer Fixing VCID-bknu-abgc-bugw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:37.338514+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:36.207140+00:00 Debian Importer Fixing VCID-m9wv-atrb-c3ac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:11.447603+00:00 Debian Importer Fixing VCID-tekr-xkck-pkfu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:48.191318+00:00 Debian Importer Fixing VCID-8sys-3sj7-c3h6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:31.132060+00:00 Debian Importer Fixing VCID-huqt-1fv6-67cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:14.899518+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:00.677295+00:00 Debian Importer Fixing VCID-zzpx-gwmv-sfbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:35.777649+00:00 Debian Importer Fixing VCID-psbg-wv2x-w7ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:32.961413+00:00 Debian Importer Fixing VCID-vwf4-v4ve-4yfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:44.183834+00:00 Debian Importer Fixing VCID-ed6c-6srd-67f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:43.251597+00:00 Debian Importer Fixing VCID-f5qc-tsbr-1yap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:03.018525+00:00 Debian Importer Fixing VCID-7kus-4n4f-myd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:48.913271+00:00 Debian Importer Fixing VCID-1wuy-5w5r-bubj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:46.162406+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:45.440900+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:22.766286+00:00 Debian Importer Fixing VCID-55vv-7jsj-xqeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:15.534185+00:00 Debian Importer Fixing VCID-qcqe-63ev-f7gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:04.257798+00:00 Debian Importer Fixing VCID-zabf-adce-sqde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:50.436148+00:00 Debian Importer Fixing VCID-c4n3-bd3z-qfbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:47.850416+00:00 Debian Importer Fixing VCID-ebcm-kjvz-73cz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:46.436358+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:32.277159+00:00 Debian Importer Fixing VCID-7ner-5xz7-93gz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:46.012132+00:00 Debian Importer Fixing VCID-xqg6-5cn7-4bct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:48.860939+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:48.167478+00:00 Debian Importer Fixing VCID-byqv-c5jp-6ybg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:39.297734+00:00 Debian Importer Fixing VCID-ennr-ek9z-a7db https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:47.125114+00:00 Debian Importer Fixing VCID-zxkf-88k3-3qcn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:41.468308+00:00 Debian Importer Fixing VCID-986n-21m7-fuc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:19.023993+00:00 Debian Importer Fixing VCID-zbwp-f5me-jqhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:48.324466+00:00 Debian Importer Fixing VCID-9f9j-z7y7-sffy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:03.521817+00:00 Debian Importer Fixing VCID-a8uf-chxy-9udv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:44.661768+00:00 Debian Importer Fixing VCID-hvmt-7qk8-wqh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:38.696868+00:00 Debian Importer Fixing VCID-sb1c-cz2g-dycu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:39.634119+00:00 Debian Importer Fixing VCID-zr2v-gabj-8kak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:43.510970+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.470038+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.430279+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.389276+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.348786+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.311597+00:00 Debian Importer Fixing VCID-63fe-saga-13ct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.235963+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.191886+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.151122+00:00 Debian Importer Fixing VCID-43ff-97jw-hkce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.119199+00:00 Debian Importer Affected by VCID-r54j-ydjm-4uca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.998606+00:00 Debian Importer Fixing VCID-9u4p-wdky-a3h1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.965776+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.931923+00:00 Debian Importer Fixing VCID-bk8r-brkr-bqc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.867452+00:00 Debian Importer Fixing VCID-pmte-bc34-pfcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.794179+00:00 Debian Importer Fixing VCID-ap3n-99gn-aucs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.677137+00:00 Debian Importer Fixing VCID-9at6-bgzv-gue3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.635820+00:00 Debian Importer Fixing VCID-vwf4-v4ve-4yfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.595140+00:00 Debian Importer Fixing VCID-cupt-538a-z3fp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.520601+00:00 Debian Importer Fixing VCID-z3fq-m317-ckb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.453086+00:00 Debian Importer Fixing VCID-7kus-4n4f-myd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.414347+00:00 Debian Importer Fixing VCID-n6mj-v1nc-hke9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.374170+00:00 Debian Importer Fixing VCID-tqwd-ffwc-mkd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.295219+00:00 Debian Importer Fixing VCID-y6sx-xqsh-wbcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.254486+00:00 Debian Importer Fixing VCID-hj93-7z1r-vkfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.189117+00:00 Debian Importer Fixing VCID-48pt-6j6q-jbcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.103723+00:00 Debian Importer Fixing VCID-34fv-tv5a-tkgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.064086+00:00 Debian Importer Fixing VCID-ddpb-zwva-rfc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.981492+00:00 Debian Importer Fixing VCID-v7ev-jtsg-cqdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.942194+00:00 Debian Importer Fixing VCID-9f9j-z7y7-sffy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.864664+00:00 Debian Importer Fixing VCID-nf5d-nejq-mkd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.711860+00:00 Debian Importer Fixing VCID-8yav-jpp1-rfbe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.670658+00:00 Debian Importer Fixing VCID-7m8s-6ydk-gbgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.629085+00:00 Debian Importer Fixing VCID-epzp-dpmr-33df https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.583613+00:00 Debian Importer Fixing VCID-h193-vjhb-j3a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.549649+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.514402+00:00 Debian Importer Fixing VCID-fjzf-5rtw-rqfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.476816+00:00 Debian Importer Fixing VCID-6rhm-xrwe-x7af https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.415050+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.379806+00:00 Debian Importer Fixing VCID-r8b9-jcqa-xyb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.308492+00:00 Debian Importer Fixing VCID-gkcp-1zz6-tfb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.270769+00:00 Debian Importer Fixing VCID-tyh4-14zn-63ez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.233463+00:00 Debian Importer Fixing VCID-qksp-5hqu-7qad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.200371+00:00 Debian Importer Fixing VCID-y3vu-z8tx-tubb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.168061+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.131960+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.098823+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.063607+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.019464+00:00 Debian Importer Fixing VCID-x2gp-mft6-1yhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.982852+00:00 Debian Importer Fixing VCID-xbe4-uvqu-6kf7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.947843+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.878857+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.847554+00:00 Debian Importer Fixing VCID-rwug-45gf-s3bz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.786760+00:00 Debian Importer Fixing VCID-p5vz-kq6m-63dd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.725560+00:00 Debian Importer Fixing VCID-7ner-5xz7-93gz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.690864+00:00 Debian Importer Fixing VCID-k1zu-wpsb-wyh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.655832+00:00 Debian Importer Fixing VCID-m27d-dqzg-w7gr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.616609+00:00 Debian Importer Fixing VCID-w9e8-ekah-wfg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.549689+00:00 Debian Importer Fixing VCID-eund-5mfa-9kbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.517147+00:00 Debian Importer Fixing VCID-zvwt-wp8r-1qhx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.484585+00:00 Debian Importer Fixing VCID-8qy8-gk53-eufc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.451955+00:00 Debian Importer Fixing VCID-dpra-jbea-4fcy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.417811+00:00 Debian Importer Fixing VCID-a2n5-xpy5-gyfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.383411+00:00 Debian Importer Fixing VCID-r6s6-y3q8-vydc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.349045+00:00 Debian Importer Fixing VCID-u4gv-ss9p-sqe9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.258427+00:00 Debian Importer Fixing VCID-fz7z-xttk-13by https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.193603+00:00 Debian Importer Fixing VCID-6jv8-3wch-wfew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.162658+00:00 Debian Importer Fixing VCID-2r38-yjx6-uuae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.128062+00:00 Debian Importer Fixing VCID-rb5h-mvxt-7qhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.027696+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.991833+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.954568+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.925737+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.859227+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.824752+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.787779+00:00 Debian Importer Fixing VCID-f4br-7sgk-27cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.755554+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.695250+00:00 Debian Importer Fixing VCID-ehx4-qzgr-qbd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.663589+00:00 Debian Importer Fixing VCID-s3p6-93jg-p7c3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.632421+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.601484+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.570652+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.535844+00:00 Debian Importer Fixing VCID-dmv1-4jgk-e3cq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.500893+00:00 Debian Importer Fixing VCID-zbwp-f5me-jqhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.466842+00:00 Debian Importer Fixing VCID-sb1c-cz2g-dycu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.432585+00:00 Debian Importer Fixing VCID-hvmt-7qk8-wqh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.398327+00:00 Debian Importer Fixing VCID-3jx3-v6c9-3be2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.362192+00:00 Debian Importer Fixing VCID-h52b-ubb6-byh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.329158+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.294477+00:00 Debian Importer Fixing VCID-qsqz-g9fv-6bgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.260814+00:00 Debian Importer Fixing VCID-xt5z-2sgq-4fc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.225527+00:00 Debian Importer Fixing VCID-ehd7-39bz-2ybk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.146036+00:00 Debian Importer Fixing VCID-cvp4-5uvw-xff2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.111366+00:00 Debian Importer Fixing VCID-67av-c7qh-5kek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.081517+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.046789+00:00 Debian Importer Fixing VCID-sw4t-1yct-ffbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.008912+00:00 Debian Importer Fixing VCID-qpwr-bqps-77cc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.972660+00:00 Debian Importer Fixing VCID-542z-gtvr-ykck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.934858+00:00 Debian Importer Fixing VCID-111d-qj24-nyde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.896495+00:00 Debian Importer Fixing VCID-d8sn-7zbc-4bhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.859290+00:00 Debian Importer Fixing VCID-kdex-mwf6-13br https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.788768+00:00 Debian Importer Fixing VCID-bv3b-3h5a-s7ez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.753646+00:00 Debian Importer Fixing VCID-zgqk-kej8-qkhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.718398+00:00 Debian Importer Fixing VCID-apn8-j2e8-uka5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.686055+00:00 Debian Importer Fixing VCID-nzu7-8h1d-mbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.623534+00:00 Debian Importer Fixing VCID-e1yx-dxa6-1bba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.592644+00:00 Debian Importer Fixing VCID-9xk8-m5c3-wud8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.558037+00:00 Debian Importer Fixing VCID-s7qt-9z8z-y7bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.521277+00:00 Debian Importer Fixing VCID-mmqp-yesh-83c1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.488809+00:00 Debian Importer Fixing VCID-6xqn-t8j4-skgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.455893+00:00 Debian Importer Fixing VCID-u9xx-wevm-ufdh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.423237+00:00 Debian Importer Fixing VCID-8mfb-mmaz-mfab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.393288+00:00 Debian Importer Fixing VCID-urhv-6gz3-u7fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.336968+00:00 Debian Importer Fixing VCID-e7t9-pdx7-5kgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.273778+00:00 Debian Importer Fixing VCID-7tfx-9358-gygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.238354+00:00 Debian Importer Fixing VCID-6yxw-veq3-eqgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.202824+00:00 Debian Importer Fixing VCID-986n-21m7-fuc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.144221+00:00 Debian Importer Fixing VCID-m3gv-mmcp-t7fz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.112533+00:00 Debian Importer Fixing VCID-h8nm-exgj-xybc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.082596+00:00 Debian Importer Fixing VCID-7pxs-dc7h-tkbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.050910+00:00 Debian Importer Fixing VCID-fdpu-1891-q3a6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:38.018231+00:00 Debian Importer Fixing VCID-fzs1-dj22-7fff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.985265+00:00 Debian Importer Fixing VCID-rn9b-2scp-byf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.951447+00:00 Debian Importer Fixing VCID-zvpn-2gds-9yc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.862290+00:00 Debian Importer Fixing VCID-tekr-xkck-pkfu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.799296+00:00 Debian Importer Fixing VCID-u99q-b5ug-jyd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.769857+00:00 Debian Importer Fixing VCID-b1vq-vecs-pfev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.742332+00:00 Debian Importer Fixing VCID-a442-jcja-zych https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.715181+00:00 Debian Importer Fixing VCID-77r2-q55r-wffw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.687884+00:00 Debian Importer Fixing VCID-w94b-nwsf-wkg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.660542+00:00 Debian Importer Fixing VCID-re5z-334n-e7a2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.633228+00:00 Debian Importer Fixing VCID-3gwr-t9bx-47cj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.580952+00:00 Debian Importer Fixing VCID-rb9n-t857-1uac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.524768+00:00 Debian Importer Fixing VCID-d791-zjab-jfh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.492270+00:00 Debian Importer Fixing VCID-p6k6-8gxf-sydp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.353420+00:00 Debian Importer Fixing VCID-58np-gsxj-8yc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.301812+00:00 Debian Importer Fixing VCID-adsx-448w-vbem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.246076+00:00 Debian Importer Fixing VCID-5499-3dkq-9fc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.219357+00:00 Debian Importer Fixing VCID-9w61-sh1p-aqff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.191227+00:00 Debian Importer Fixing VCID-wfgw-5dme-yfan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.165254+00:00 Debian Importer Fixing VCID-1g96-fryn-9qak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.135930+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.104793+00:00 Debian Importer Fixing VCID-mcd2-e66p-j3b7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.076013+00:00 Debian Importer Fixing VCID-zn8s-5jkp-bkbr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.049035+00:00 Debian Importer Fixing VCID-5211-bpr9-nqaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:37.021837+00:00 Debian Importer Fixing VCID-q6w8-pqsz-7ud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.991598+00:00 Debian Importer Fixing VCID-wsh5-yefr-d7ad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.933839+00:00 Debian Importer Fixing VCID-9fz9-f74u-2yfe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.902364+00:00 Debian Importer Fixing VCID-r1sd-avzd-d7gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.842701+00:00 Debian Importer Fixing VCID-6c2h-e3rr-eyfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.778192+00:00 Debian Importer Fixing VCID-e3vd-dhyn-1qfa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.677826+00:00 Debian Importer Fixing VCID-ztn6-xpxt-vkhb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:16.999854+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:41.080457+00:00 Debian Importer Fixing VCID-1u6r-4dzb-wfh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:48.541306+00:00 Debian Importer Fixing VCID-c765-b3fs-nbdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:49.811585+00:00 Debian Importer Fixing VCID-kby8-5rnd-fffs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:48.720695+00:00 Debian Importer Fixing VCID-qcqe-63ev-f7gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:27.676727+00:00 Debian Importer Fixing VCID-w9ce-m3x8-n3ak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:17.902179+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:39.665471+00:00 Debian Importer Fixing VCID-zkuy-4hqk-vkca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:35.369653+00:00 Debian Importer Fixing VCID-w7ce-jd16-xbbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:00.442207+00:00 Debian Importer Fixing VCID-fndq-j9d2-afed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:27.207156+00:00 Debian Importer Fixing VCID-ggu9-8qd1-4ffx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:14.193846+00:00 Debian Importer Fixing VCID-gy3u-c6dc-sbbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:33.120282+00:00 Debian Importer Fixing VCID-g6cn-x656-5fcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:23.247716+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:18.122817+00:00 Debian Importer Fixing VCID-grs7-fu68-2ff3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:00.252433+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:46.423319+00:00 Debian Importer Fixing VCID-nbq8-qr83-qbh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:28.754980+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:17.498536+00:00 Debian Importer Fixing VCID-czy4-hnuj-fbgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:39.810923+00:00 Debian Importer Fixing VCID-b4z5-5hbq-5ka8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:38.888530+00:00 Debian Importer Fixing VCID-j3wr-j8e1-tbeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:28.898514+00:00 Debian Importer Fixing VCID-a5sa-32q2-s3he https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:08.883958+00:00 Debian Importer Fixing VCID-8pdp-epea-juhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:05.931841+00:00 Debian Importer Fixing VCID-ngds-k5mh-t3ae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:09.941274+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:28.567826+00:00 Debian Importer Fixing VCID-yx1m-ayfg-ryc3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:03.150239+00:00 Debian Importer Fixing VCID-f5qc-tsbr-1yap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:11.737631+00:00 Debian Importer Fixing VCID-jwaj-b8n5-bbcx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:26.965514+00:00 Debian Importer Fixing VCID-wz3z-sq5y-pbd6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:11.191995+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:48.583161+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:44.972937+00:00 Debian Importer Fixing VCID-7pts-41xh-mbh4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:16.936652+00:00 Debian Importer Fixing VCID-bknu-abgc-bugw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:47.968010+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:46.962159+00:00 Debian Importer Fixing VCID-m9wv-atrb-c3ac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:16.193196+00:00 Debian Importer Fixing VCID-8sys-3sj7-c3h6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:05.704119+00:00 Debian Importer Fixing VCID-huqt-1fv6-67cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:15.254079+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:05.406245+00:00 Debian Importer Fixing VCID-zzpx-gwmv-sfbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:51.049379+00:00 Debian Importer Fixing VCID-psbg-wv2x-w7ba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:04.586430+00:00 Debian Importer Fixing VCID-55vv-7jsj-xqeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:12.068663+00:00 Debian Importer Fixing VCID-ed6c-6srd-67f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:12.391061+00:00 Debian Importer Fixing VCID-1wuy-5w5r-bubj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:37.761252+00:00 Debian Importer Fixing VCID-ebcm-kjvz-73cz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:34.602554+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:07.821661+00:00 Debian Importer Fixing VCID-zabf-adce-sqde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:59.064658+00:00 Debian Importer Fixing VCID-c4n3-bd3z-qfbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:15.715554+00:00 Debian Importer Fixing VCID-xqg6-5cn7-4bct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:36.756824+00:00 Debian Importer Fixing VCID-byqv-c5jp-6ybg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:31.052189+00:00 Debian Importer Fixing VCID-ennr-ek9z-a7db https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:33.068445+00:00 Debian Importer Fixing VCID-zxkf-88k3-3qcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:34.438400+00:00 Debian Importer Fixing VCID-a8uf-chxy-9udv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:09.042364+00:00 Debian Importer Fixing VCID-zr2v-gabj-8kak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:19:49.476808+00:00 Debian Importer Affected by VCID-r54j-ydjm-4uca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:46.728234+00:00 Debian Importer Fixing VCID-d791-zjab-jfh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:46.380833+00:00 Debian Importer Fixing VCID-e3vd-dhyn-1qfa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:38.390135+00:00 Debian Importer Fixing VCID-7ner-5xz7-93gz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:38.360064+00:00 Debian Importer Fixing VCID-zvwt-wp8r-1qhx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:34.949704+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:33.365777+00:00 Debian Importer Fixing VCID-6rhm-xrwe-x7af https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:15.075135+00:00 Debian Importer Fixing VCID-h52b-ubb6-byh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:12.636037+00:00 Debian Importer Fixing VCID-pmte-bc34-pfcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:11.781634+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:07.071194+00:00 Debian Importer Fixing VCID-dpra-jbea-4fcy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:05.403881+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:05.102672+00:00 Debian Importer Fixing VCID-rb5h-mvxt-7qhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:02.719301+00:00 Debian Importer Fixing VCID-p5vz-kq6m-63dd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:53.714775+00:00 Debian Importer Fixing VCID-wsh5-yefr-d7ad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:45.777877+00:00 Debian Importer Fixing VCID-9f9j-z7y7-sffy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:43.199248+00:00 Debian Importer Fixing VCID-u99q-b5ug-jyd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:39.005911+00:00 Debian Importer Fixing VCID-ehd7-39bz-2ybk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:23.934341+00:00 Debian Importer Fixing VCID-rwug-45gf-s3bz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:19.572775+00:00 Debian Importer Fixing VCID-apn8-j2e8-uka5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:11.289718+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:07.285682+00:00 Debian Importer Fixing VCID-111d-qj24-nyde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:58.362462+00:00 Debian Importer Fixing VCID-6yxw-veq3-eqgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:57.877253+00:00 Debian Importer Fixing VCID-gkcp-1zz6-tfb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:57.788750+00:00 Debian Importer Fixing VCID-m3gv-mmcp-t7fz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:51.912912+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:50.382636+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:40.558686+00:00 Debian Importer Fixing VCID-e1yx-dxa6-1bba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:40.485863+00:00 Debian Importer Fixing VCID-58np-gsxj-8yc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:33.093860+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:30.503730+00:00 Debian Importer Fixing VCID-m27d-dqzg-w7gr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:25.494879+00:00 Debian Importer Fixing VCID-epzp-dpmr-33df https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:22.203382+00:00 Debian Importer Fixing VCID-6c2h-e3rr-eyfw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:22.014268+00:00 Debian Importer Fixing VCID-6xqn-t8j4-skgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:17.875173+00:00 Debian Importer Fixing VCID-5211-bpr9-nqaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:16.503660+00:00 Debian Importer Fixing VCID-a2n5-xpy5-gyfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:15.430838+00:00 Debian Importer Fixing VCID-eund-5mfa-9kbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:13.166814+00:00 Debian Importer Fixing VCID-542z-gtvr-ykck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:08.582070+00:00 Debian Importer Fixing VCID-ddpb-zwva-rfc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:06.670407+00:00 Debian Importer Fixing VCID-s7qt-9z8z-y7bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:00.444459+00:00 Debian Importer Fixing VCID-9u4p-wdky-a3h1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:37.088439+00:00 Debian Importer Fixing VCID-k1zu-wpsb-wyh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:30.194164+00:00 Debian Importer Fixing VCID-w9e8-ekah-wfg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:26.719145+00:00 Debian Importer Fixing VCID-e7t9-pdx7-5kgm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:22.442010+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:17.091809+00:00 Debian Importer Fixing VCID-urhv-6gz3-u7fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:13.818170+00:00 Debian Importer Fixing VCID-rb9n-t857-1uac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:13.524322+00:00 Debian Importer Fixing VCID-hvmt-7qk8-wqh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:10.593881+00:00 Debian Importer Fixing VCID-wfgw-5dme-yfan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:10.414449+00:00 Debian Importer Fixing VCID-67av-c7qh-5kek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:58.666487+00:00 Debian Importer Fixing VCID-7kus-4n4f-myd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:44.862861+00:00 Debian Importer Fixing VCID-63fe-saga-13ct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:43.219554+00:00 Debian Importer Fixing VCID-bk8r-brkr-bqc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:41.481022+00:00 Debian Importer Fixing VCID-77r2-q55r-wffw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:40.483402+00:00 Debian Importer Fixing VCID-y3vu-z8tx-tubb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:34.193376+00:00 Debian Importer Fixing VCID-986n-21m7-fuc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:18.386122+00:00 Debian Importer Fixing VCID-8qy8-gk53-eufc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:14.142347+00:00 Debian Importer Fixing VCID-x2gp-mft6-1yhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:09.113547+00:00 Debian Importer Fixing VCID-7pxs-dc7h-tkbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:05.134644+00:00 Debian Importer Fixing VCID-34fv-tv5a-tkgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:01.315706+00:00 Debian Importer Fixing VCID-qksp-5hqu-7qad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:01.249858+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:01.161409+00:00 Debian Importer Fixing VCID-5499-3dkq-9fc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:50.968120+00:00 Debian Importer Fixing VCID-q6w8-pqsz-7ud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:41.778903+00:00 Debian Importer Fixing VCID-2r38-yjx6-uuae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:37.305899+00:00 Debian Importer Fixing VCID-sb1c-cz2g-dycu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:29.642166+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:27.800277+00:00 Debian Importer Fixing VCID-9xk8-m5c3-wud8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:20.606813+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:17.473585+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:47.728485+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:42.322183+00:00 Debian Importer Fixing VCID-48pt-6j6q-jbcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:39.944813+00:00 Debian Importer Fixing VCID-dmv1-4jgk-e3cq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:26.176120+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:17.433249+00:00 Debian Importer Fixing VCID-8yav-jpp1-rfbe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:14.595041+00:00 Debian Importer Fixing VCID-b1vq-vecs-pfev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:11.352064+00:00 Debian Importer Fixing VCID-cvp4-5uvw-xff2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:10.719489+00:00 Debian Importer Fixing VCID-1g96-fryn-9qak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:03.108138+00:00 Debian Importer Fixing VCID-fjzf-5rtw-rqfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:02.171747+00:00 Debian Importer Fixing VCID-rn9b-2scp-byf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:58.166513+00:00 Debian Importer Fixing VCID-h8nm-exgj-xybc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:57.484064+00:00 Debian Importer Fixing VCID-w94b-nwsf-wkg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:54.380166+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:45.620239+00:00 Debian Importer Fixing VCID-9at6-bgzv-gue3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.686095+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.548970+00:00 Debian Importer Fixing VCID-sw4t-1yct-ffbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:39.731661+00:00 Debian Importer Fixing VCID-f4br-7sgk-27cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:27.603498+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:26.330863+00:00 Debian Importer Fixing VCID-zgqk-kej8-qkhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:22.077519+00:00 Debian Importer Fixing VCID-nf5d-nejq-mkd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:52.005135+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:51.935652+00:00 Debian Importer Fixing VCID-fdpu-1891-q3a6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:47.899086+00:00 Debian Importer Fixing VCID-tqwd-ffwc-mkd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:44.425698+00:00 Debian Importer Fixing VCID-fz7z-xttk-13by https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:44.094011+00:00 Debian Importer Fixing VCID-ehx4-qzgr-qbd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:36.646069+00:00 Debian Importer Fixing VCID-fzs1-dj22-7fff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:36.388414+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:30.936337+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:30.048656+00:00 Debian Importer Fixing VCID-cupt-538a-z3fp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:27.810878+00:00 Debian Importer Fixing VCID-u4gv-ss9p-sqe9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:13.438890+00:00 Debian Importer Fixing VCID-mcd2-e66p-j3b7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:11.812943+00:00 Debian Importer Fixing VCID-zbwp-f5me-jqhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:11.783996+00:00 Debian Importer Fixing VCID-mmqp-yesh-83c1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:10.167599+00:00 Debian Importer Fixing VCID-u9xx-wevm-ufdh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:06.272684+00:00 Debian Importer Fixing VCID-qpwr-bqps-77cc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:05.508719+00:00 Debian Importer Fixing VCID-3jx3-v6c9-3be2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:59.281627+00:00 Debian Importer Fixing VCID-y6sx-xqsh-wbcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:56.231988+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:54.875417+00:00 Debian Importer Fixing VCID-kdex-mwf6-13br https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:51.032576+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:43.529498+00:00 Debian Importer Fixing VCID-p6k6-8gxf-sydp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:42.567596+00:00 Debian Importer Fixing VCID-9fz9-f74u-2yfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:38.955031+00:00 Debian Importer Fixing VCID-r8b9-jcqa-xyb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:34.967446+00:00 Debian Importer Fixing VCID-9w61-sh1p-aqff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:26.340561+00:00 Debian Importer Fixing VCID-nzu7-8h1d-mbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:25.070914+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:20.079006+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:16.032930+00:00 Debian Importer Fixing VCID-7tfx-9358-gygx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:11.798045+00:00 Debian Importer Fixing VCID-6jv8-3wch-wfew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:59.842170+00:00 Debian Importer Fixing VCID-zn8s-5jkp-bkbr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:42.618711+00:00 Debian Importer Fixing VCID-zvpn-2gds-9yc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:21.139953+00:00 Debian Importer Fixing VCID-h193-vjhb-j3a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:21.107777+00:00 Debian Importer Fixing VCID-re5z-334n-e7a2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:14.904846+00:00 Debian Importer Fixing VCID-vwf4-v4ve-4yfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:12.463194+00:00 Debian Importer Fixing VCID-r1sd-avzd-d7gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:53.439146+00:00 Debian Importer Fixing VCID-v7ev-jtsg-cqdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:50.405215+00:00 Debian Importer Fixing VCID-adsx-448w-vbem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:46.228014+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:41.785201+00:00 Debian Importer Fixing VCID-xt5z-2sgq-4fc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:32.682472+00:00 Debian Importer Fixing VCID-z3fq-m317-ckb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:27.910407+00:00 Debian Importer Fixing VCID-ztn6-xpxt-vkhb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:25.866598+00:00 Debian Importer Fixing VCID-43ff-97jw-hkce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:23.904847+00:00 Debian Importer Fixing VCID-3gwr-t9bx-47cj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:19.941802+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:13.297566+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:12.341505+00:00 Debian Importer Fixing VCID-8mfb-mmaz-mfab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:05.182532+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:57.262374+00:00 Debian Importer Fixing VCID-s3p6-93jg-p7c3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:56.716361+00:00 Debian Importer Fixing VCID-tekr-xkck-pkfu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:52.874047+00:00 Debian Importer Fixing VCID-a442-jcja-zych https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:50.431018+00:00 Debian Importer Fixing VCID-d8sn-7zbc-4bhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:50.348960+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:47.860850+00:00 Debian Importer Fixing VCID-7m8s-6ydk-gbgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:46.066265+00:00 Debian Importer Fixing VCID-ap3n-99gn-aucs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:38.486894+00:00 Debian Importer Fixing VCID-qsqz-g9fv-6bgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:20.459447+00:00 Debian Importer Fixing VCID-tyh4-14zn-63ez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:15.074413+00:00 Debian Importer Fixing VCID-r6s6-y3q8-vydc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:01.649886+00:00 Debian Importer Fixing VCID-xbe4-uvqu-6kf7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:51.329022+00:00 Debian Importer Fixing VCID-n6mj-v1nc-hke9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:43.881475+00:00 Debian Importer Fixing VCID-bv3b-3h5a-s7ez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:41.287036+00:00 Debian Importer Fixing VCID-hj93-7z1r-vkfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:38.515187+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:35.033010+00:00 Debian Importer Fixing VCID-1u6r-4dzb-wfh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:27.213074+00:00 Debian Importer Fixing VCID-c765-b3fs-nbdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:16.739353+00:00 Debian Importer Fixing VCID-kby8-5rnd-fffs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:11.302930+00:00 Debian Importer Fixing VCID-qcqe-63ev-f7gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:10.680446+00:00 Debian Importer Fixing VCID-w9ce-m3x8-n3ak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:05.186532+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:00.924658+00:00 Debian Importer Fixing VCID-zkuy-4hqk-vkca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:00.657095+00:00 Debian Importer Fixing VCID-w7ce-jd16-xbbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:57.156148+00:00 Debian Importer Fixing VCID-fndq-j9d2-afed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:56.240610+00:00 Debian Importer Fixing VCID-ggu9-8qd1-4ffx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:52.306807+00:00 Debian Importer Fixing VCID-gy3u-c6dc-sbbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:43.584902+00:00 Debian Importer Fixing VCID-g6cn-x656-5fcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:42.534297+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:41.016150+00:00 Debian Importer Fixing VCID-grs7-fu68-2ff3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:39.719193+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:37.784677+00:00 Debian Importer Fixing VCID-nbq8-qr83-qbh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:36.572213+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:35.600933+00:00 Debian Importer Fixing VCID-czy4-hnuj-fbgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.819485+00:00 Debian Importer Fixing VCID-b4z5-5hbq-5ka8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.738391+00:00 Debian Importer Fixing VCID-j3wr-j8e1-tbeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.522058+00:00 Debian Importer Fixing VCID-a5sa-32q2-s3he https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:25.254388+00:00 Debian Importer Fixing VCID-8pdp-epea-juhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:25.227639+00:00 Debian Importer Fixing VCID-ngds-k5mh-t3ae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:15.149781+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:11.423526+00:00 Debian Importer Fixing VCID-yx1m-ayfg-ryc3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:09.614528+00:00 Debian Importer Fixing VCID-f5qc-tsbr-1yap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:03.752420+00:00 Debian Importer Fixing VCID-jwaj-b8n5-bbcx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:00.094662+00:00 Debian Importer Fixing VCID-wz3z-sq5y-pbd6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:51.051508+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:49.040813+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:48.160707+00:00 Debian Importer Fixing VCID-7pts-41xh-mbh4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:40.500923+00:00 Debian Importer Fixing VCID-bknu-abgc-bugw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.425728+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.342829+00:00 Debian Importer Fixing VCID-m9wv-atrb-c3ac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:36.105623+00:00 Debian Importer Fixing VCID-8sys-3sj7-c3h6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:35.964316+00:00 Debian Importer Fixing VCID-huqt-1fv6-67cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:32.558097+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:29.611840+00:00 Debian Importer Fixing VCID-zzpx-gwmv-sfbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:29.101349+00:00 Debian Importer Fixing VCID-psbg-wv2x-w7ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:23.631283+00:00 Debian Importer Fixing VCID-55vv-7jsj-xqeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:19.056843+00:00 Debian Importer Fixing VCID-ed6c-6srd-67f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:05.288956+00:00 Debian Importer Fixing VCID-1wuy-5w5r-bubj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:00.732416+00:00 Debian Importer Fixing VCID-ebcm-kjvz-73cz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:00.015241+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:52.549279+00:00 Debian Importer Fixing VCID-zabf-adce-sqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:51.555666+00:00 Debian Importer Fixing VCID-c4n3-bd3z-qfbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:49.498971+00:00 Debian Importer Fixing VCID-xqg6-5cn7-4bct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:45.328832+00:00 Debian Importer Fixing VCID-byqv-c5jp-6ybg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:45.202498+00:00 Debian Importer Fixing VCID-ennr-ek9z-a7db https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:34.768979+00:00 Debian Importer Fixing VCID-zxkf-88k3-3qcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:17.140902+00:00 Debian Importer Fixing VCID-a8uf-chxy-9udv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:10.275975+00:00 Debian Importer Fixing VCID-zr2v-gabj-8kak https://security-tracker.debian.org/tracker/data/json 38.1.0