Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3
Next non-vulnerable version 1.2.30+ds1-1
Latest non-vulnerable version 1.2.30+ds1-1
Risk 10.0
Vulnerabilities affecting this package (25)
Vulnerability Summary Fixed by
VCID-3y7d-ujep-4ydm
Aliases:
CVE-2024-34340
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-44fx-4w2y-y3dy
Aliases:
CVE-2024-31458
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-4e5y-1s19-r7g7
Aliases:
CVE-2025-66399
Cacti is an open source performance and fault management framework. Prior to 1.2.29, there is an input-validation flaw in the SNMP device configuration functionality. An authenticated Cacti user can supply crafted SNMP community strings containing control characters (including newlines) that are accepted, stored verbatim in the database, and later embedded into backend SNMP operations. In environments where downstream SNMP tooling or wrappers interpret newline-separated tokens as command boundaries, this can lead to unintended command execution with the privileges of the Cacti process. This vulnerability is fixed in 1.2.29.
1.2.30+ds1-1
Affected by 0 other vulnerabilities.
VCID-4twv-1yys-eban
Aliases:
CVE-2025-22604
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-6t6n-ws5n-wkay
Aliases:
CVE-2024-31443
Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is not thoroughly checked and is used to concatenate the HTML statement in `grow_right_pane_tree()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-6ze5-dqdn-ykg3
Aliases:
CVE-2024-45598
Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-7m68-seeq-tuae
Aliases:
CVE-2025-24368
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-85gc-u991-z3dw
Aliases:
CVE-2024-25641
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-be57-gxmc-vqd4
Aliases:
CVE-2024-43362
Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-cqr3-wwhj-tyck
Aliases:
CVE-2022-48538
In Cacti 1.2.19, there is an authentication bypass in the web login functionality because of improper validation in the PHP code: cacti_ldap_auth() allows a zero as the password.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-fhtp-y9a5-vqgj
Aliases:
CVE-2024-31445
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-hj89-pnag-3fer
Aliases:
CVE-2024-43363
Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-jkca-shmj-mbbu
Aliases:
CVE-2024-31459
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-k7kv-za2s-dud5
Aliases:
CVE-2024-31460
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-khhn-9sja-sfgr
Aliases:
CVE-2025-24367
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-mebp-4rfu-vqcq
Aliases:
CVE-2024-47875
GHSA-gx9m-whjm-85jf
DOMpurify has a nesting-based mXSS DOMpurify was vulnerable to nesting-based mXSS fixed by [0ef5e537](https://github.com/cure53/DOMPurify/tree/0ef5e537a514f904b6aa1d7ad9e749e365d7185f) (2.x) and [merge 943](https://github.com/cure53/DOMPurify/pull/943) Backporter should be aware of GHSA-mmhx-hmjr-r674 (CVE-2024-45801) when cherry-picking POC is avaible under [test](https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098)
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-pxqa-nkv3-jqfs
Aliases:
CVE-2023-30534
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
1.2.30+ds1-1
Affected by 0 other vulnerabilities.
VCID-qnz1-w7bb-97ee
Aliases:
CVE-2022-41444
Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted POST request to graphs_new.php.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-s8du-gzj2-gkc1
Aliases:
CVE-2024-43364
Cacti is an open source performance and fault management framework. The `title` parameter is not properly sanitized when saving external links in links.php . Morever, the said title parameter is stored in the database and reflected back to user in index.php, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `title` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-sx2t-uzae-2fh9
Aliases:
CVE-2024-54145
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the get_discovery_results function of automation_devices.php using the network parameter. This vulnerability is fixed in 1.2.29.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-vbs9-gben-9kgc
Aliases:
CVE-2024-48910
GHSA-p3vf-v8qc-cwcr
DOMPurify vulnerable to tampering by prototype polution dompurify was vulnerable to prototype pollution Fixed by https://github.com/cure53/DOMPurify/commit/d1dd0374caef2b4c56c3bd09fe1988c3479166dc
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-xdbp-7rtr-fyb7
Aliases:
CVE-2024-43365
Cacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the “consolenewsection” parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-xkkm-ss3p-1udc
Aliases:
CVE-2023-46490
SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function.
1.2.30+ds1-1
Affected by 0 other vulnerabilities.
VCID-y683-kz6e-afhv
Aliases:
CVE-2024-31444
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules_form_save()` function in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the HTML statement in `form_confirm()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
VCID-zxu5-equ9-1kam
Aliases:
CVE-2025-45160
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.
1.2.24+ds1-1+deb12u5
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (29)
Vulnerability Summary Aliases
VCID-34z4-1zqk-afcm Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39515
VCID-3tqy-g42y-9fef A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field CVE-2020-25706
VCID-5ykb-6nvx-k3e4 Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39362
VCID-8nbc-ethb-6kcn Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-17358
VCID-9swv-zvke-ubet Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. CVE-2020-8813
VCID-a8j1-24bw-gudu security update CVE-2023-39364
VCID-akj7-kh8f-97ct security update CVE-2023-49088
VCID-ay5a-nkmf-5yar security update CVE-2023-49086
VCID-c2b8-ss11-9yhq Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39360
VCID-cre7-1uhc-bka2 Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-16723
VCID-cxs3-zh36-m7en Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. CVE-2020-7106
VCID-d7db-n89n-qyd8 security update CVE-2023-49084
VCID-e48s-dv1e-4fgn In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change. CVE-2020-13231
VCID-fwp2-z586-ebbq Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-17357
VCID-h3qa-svy4-1fcr security update CVE-2023-49085
VCID-huf2-qwju-6bf2 Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39365
VCID-k6z6-4pb4-tbeu Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) data_input.php, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php. CVE-2020-23226
VCID-pau5-hfbv-nucp Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39513
VCID-qvkt-vk55-4bbx A vulnerability in Cacti could lead to remote code execution. CVE-2020-35701
VCID-rftg-byj2-jkh9 Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723. CVE-2023-37543
VCID-sb43-hapb-1uf2 Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39357
VCID-ses2-y1j2-vbbx Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. CVE-2020-14295
VCID-uj1s-uuyx-mya5 Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. CVE-2020-7237
VCID-vsjt-qjyw-hbfs Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39359
VCID-wrxa-2us4-vkf9 In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs). CVE-2020-13230
VCID-ws4h-295a-9qgx Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39516
VCID-xbb2-av4z-m3dp Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2022-46169
VCID-xpvn-y3b8-skgb Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2022-0730
VCID-ypan-57sx-vyam Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39361

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:00:05.427329+00:00 Debian Importer Affected by VCID-zxu5-equ9-1kam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:59.426719+00:00 Debian Importer Affected by VCID-xkkm-ss3p-1udc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:26:25.268375+00:00 Debian Importer Affected by VCID-pxqa-nkv3-jqfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:25:00.268948+00:00 Debian Importer Affected by VCID-cqr3-wwhj-tyck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:33.280109+00:00 Debian Importer Affected by VCID-4e5y-1s19-r7g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T01:04:24.725782+00:00 Debian Oval Importer Fixing VCID-cxs3-zh36-m7en https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:03:36.850805+00:00 Debian Oval Importer Fixing VCID-wrxa-2us4-vkf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:56:47.972788+00:00 Debian Oval Importer Affected by VCID-k7kv-za2s-dud5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:54:10.068393+00:00 Debian Oval Importer Affected by VCID-sx2t-uzae-2fh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:54:00.430404+00:00 Debian Oval Importer Affected by VCID-mebp-4rfu-vqcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:07:17.431346+00:00 Debian Oval Importer Fixing VCID-8nbc-ethb-6kcn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:57:43.221094+00:00 Debian Oval Importer Affected by VCID-44fx-4w2y-y3dy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:31:34.400962+00:00 Debian Oval Importer Fixing VCID-3tqy-g42y-9fef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:27:19.558343+00:00 Debian Oval Importer Fixing VCID-rftg-byj2-jkh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:10:08.475697+00:00 Debian Oval Importer Affected by VCID-fhtp-y9a5-vqgj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:10:05.144385+00:00 Debian Oval Importer Affected by VCID-6ze5-dqdn-ykg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:59:08.653382+00:00 Debian Oval Importer Affected by VCID-6t6n-ws5n-wkay https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:15:25.133757+00:00 Debian Oval Importer Fixing VCID-ay5a-nkmf-5yar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:14:41.261099+00:00 Debian Oval Importer Fixing VCID-k6z6-4pb4-tbeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:37:25.495368+00:00 Debian Oval Importer Fixing VCID-sb43-hapb-1uf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:36:16.984006+00:00 Debian Oval Importer Fixing VCID-akj7-kh8f-97ct https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:21:08.400902+00:00 Debian Oval Importer Fixing VCID-ses2-y1j2-vbbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:33:49.249963+00:00 Debian Oval Importer Affected by VCID-4twv-1yys-eban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:27:36.910058+00:00 Debian Oval Importer Affected by VCID-khhn-9sja-sfgr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:15:02.106831+00:00 Debian Oval Importer Fixing VCID-e48s-dv1e-4fgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:29:24.301831+00:00 Debian Oval Importer Fixing VCID-ypan-57sx-vyam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:21:05.836852+00:00 Debian Oval Importer Fixing VCID-d7db-n89n-qyd8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:03:42.151816+00:00 Debian Oval Importer Fixing VCID-uj1s-uuyx-mya5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:56:30.601593+00:00 Debian Oval Importer Fixing VCID-pau5-hfbv-nucp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:41:08.722768+00:00 Debian Oval Importer Fixing VCID-c2b8-ss11-9yhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:40:25.124384+00:00 Debian Oval Importer Affected by VCID-3y7d-ujep-4ydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:37:43.524368+00:00 Debian Oval Importer Affected by VCID-jkca-shmj-mbbu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:43:39.146729+00:00 Debian Oval Importer Fixing VCID-qvkt-vk55-4bbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:43:03.833450+00:00 Debian Oval Importer Affected by VCID-7m68-seeq-tuae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:37:59.162569+00:00 Debian Oval Importer Affected by VCID-be57-gxmc-vqd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:37:34.681642+00:00 Debian Oval Importer Affected by VCID-vbs9-gben-9kgc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:34:53.502295+00:00 Debian Oval Importer Fixing VCID-a8j1-24bw-gudu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:22:16.248533+00:00 Debian Oval Importer Fixing VCID-5ykb-6nvx-k3e4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:07:13.018507+00:00 Debian Oval Importer Affected by VCID-qnz1-w7bb-97ee https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:05:30.271437+00:00 Debian Oval Importer Fixing VCID-vsjt-qjyw-hbfs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:00:08.604122+00:00 Debian Oval Importer Fixing VCID-xbb2-av4z-m3dp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:58:36.864713+00:00 Debian Oval Importer Affected by VCID-s8du-gzj2-gkc1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:56:59.187301+00:00 Debian Oval Importer Fixing VCID-fwp2-z586-ebbq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:41:58.404964+00:00 Debian Oval Importer Fixing VCID-huf2-qwju-6bf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:32:43.300617+00:00 Debian Oval Importer Fixing VCID-9swv-zvke-ubet https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:32:27.291478+00:00 Debian Oval Importer Fixing VCID-34z4-1zqk-afcm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:26:45.711102+00:00 Debian Oval Importer Affected by VCID-y683-kz6e-afhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:21:40.892181+00:00 Debian Oval Importer Fixing VCID-h3qa-svy4-1fcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:01:27.138347+00:00 Debian Oval Importer Affected by VCID-xdbp-7rtr-fyb7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:43:03.232955+00:00 Debian Oval Importer Affected by VCID-85gc-u991-z3dw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:38:35.848057+00:00 Debian Oval Importer Affected by VCID-hj89-pnag-3fer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:20:02.382018+00:00 Debian Oval Importer Fixing VCID-ws4h-295a-9qgx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:19:22.242502+00:00 Debian Oval Importer Fixing VCID-cre7-1uhc-bka2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:19:16.056965+00:00 Debian Oval Importer Fixing VCID-xpvn-y3b8-skgb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T08:56:04.144419+00:00 Debian Importer Affected by VCID-zxu5-equ9-1kam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:59.343068+00:00 Debian Importer Affected by VCID-xkkm-ss3p-1udc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:54.095707+00:00 Debian Importer Affected by VCID-pxqa-nkv3-jqfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:54.767706+00:00 Debian Importer Affected by VCID-cqr3-wwhj-tyck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:04.891172+00:00 Debian Importer Affected by VCID-4e5y-1s19-r7g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T00:36:28.533762+00:00 Debian Oval Importer Fixing VCID-cxs3-zh36-m7en https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:35:41.436966+00:00 Debian Oval Importer Fixing VCID-wrxa-2us4-vkf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:29:06.529529+00:00 Debian Oval Importer Affected by VCID-k7kv-za2s-dud5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:26:33.626091+00:00 Debian Oval Importer Affected by VCID-sx2t-uzae-2fh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:26:23.325368+00:00 Debian Oval Importer Affected by VCID-mebp-4rfu-vqcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:41:16.920488+00:00 Debian Oval Importer Fixing VCID-8nbc-ethb-6kcn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:31:55.086206+00:00 Debian Oval Importer Affected by VCID-44fx-4w2y-y3dy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:06:48.796610+00:00 Debian Oval Importer Fixing VCID-3tqy-g42y-9fef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:02:41.712344+00:00 Debian Oval Importer Fixing VCID-rftg-byj2-jkh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:46:06.698005+00:00 Debian Oval Importer Affected by VCID-fhtp-y9a5-vqgj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:46:03.496474+00:00 Debian Oval Importer Affected by VCID-6ze5-dqdn-ykg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:35:26.454163+00:00 Debian Oval Importer Affected by VCID-6t6n-ws5n-wkay https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:53:02.364893+00:00 Debian Oval Importer Fixing VCID-ay5a-nkmf-5yar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:52:19.696642+00:00 Debian Oval Importer Fixing VCID-k6z6-4pb4-tbeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:16:21.614141+00:00 Debian Oval Importer Fixing VCID-sb43-hapb-1uf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:15:15.419569+00:00 Debian Oval Importer Fixing VCID-akj7-kh8f-97ct https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:00:41.786071+00:00 Debian Oval Importer Fixing VCID-ses2-y1j2-vbbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:15:05.825905+00:00 Debian Oval Importer Affected by VCID-4twv-1yys-eban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:09:08.094266+00:00 Debian Oval Importer Affected by VCID-khhn-9sja-sfgr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:56:50.283946+00:00 Debian Oval Importer Fixing VCID-e48s-dv1e-4fgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:12:20.256201+00:00 Debian Oval Importer Fixing VCID-ypan-57sx-vyam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:04:21.351159+00:00 Debian Oval Importer Fixing VCID-d7db-n89n-qyd8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:47:41.106006+00:00 Debian Oval Importer Fixing VCID-uj1s-uuyx-mya5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:40:45.279485+00:00 Debian Oval Importer Fixing VCID-pau5-hfbv-nucp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:25:34.219451+00:00 Debian Oval Importer Fixing VCID-c2b8-ss11-9yhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:24:53.042405+00:00 Debian Oval Importer Affected by VCID-3y7d-ujep-4ydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:22:17.767722+00:00 Debian Oval Importer Affected by VCID-jkca-shmj-mbbu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:29:42.169859+00:00 Debian Oval Importer Fixing VCID-qvkt-vk55-4bbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:29:07.940083+00:00 Debian Oval Importer Affected by VCID-7m68-seeq-tuae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:24:12.013103+00:00 Debian Oval Importer Affected by VCID-be57-gxmc-vqd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:23:47.422302+00:00 Debian Oval Importer Affected by VCID-vbs9-gben-9kgc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:21:11.332332+00:00 Debian Oval Importer Fixing VCID-a8j1-24bw-gudu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:08:43.074445+00:00 Debian Oval Importer Fixing VCID-5ykb-6nvx-k3e4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:53:48.923571+00:00 Debian Oval Importer Affected by VCID-qnz1-w7bb-97ee https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:51:59.707003+00:00 Debian Oval Importer Fixing VCID-vsjt-qjyw-hbfs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:46:44.801400+00:00 Debian Oval Importer Fixing VCID-xbb2-av4z-m3dp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:45:15.056229+00:00 Debian Oval Importer Affected by VCID-s8du-gzj2-gkc1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:43:38.804438+00:00 Debian Oval Importer Fixing VCID-fwp2-z586-ebbq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:28:49.404629+00:00 Debian Oval Importer Fixing VCID-huf2-qwju-6bf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:19:46.473423+00:00 Debian Oval Importer Fixing VCID-9swv-zvke-ubet https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:19:31.074474+00:00 Debian Oval Importer Fixing VCID-34z4-1zqk-afcm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:13:57.879289+00:00 Debian Oval Importer Affected by VCID-y683-kz6e-afhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:08:58.499373+00:00 Debian Oval Importer Fixing VCID-h3qa-svy4-1fcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:49:01.423629+00:00 Debian Oval Importer Affected by VCID-xdbp-7rtr-fyb7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:30:50.083638+00:00 Debian Oval Importer Affected by VCID-85gc-u991-z3dw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:26:28.872667+00:00 Debian Oval Importer Affected by VCID-hj89-pnag-3fer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:08:19.019557+00:00 Debian Oval Importer Fixing VCID-ws4h-295a-9qgx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:07:38.351626+00:00 Debian Oval Importer Fixing VCID-cre7-1uhc-bka2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:07:32.095965+00:00 Debian Oval Importer Fixing VCID-xpvn-y3b8-skgb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-09T00:06:32.912555+00:00 Debian Oval Importer Fixing VCID-cxs3-zh36-m7en https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-09T00:05:47.080600+00:00 Debian Oval Importer Fixing VCID-wrxa-2us4-vkf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:59:29.315023+00:00 Debian Oval Importer Affected by VCID-k7kv-za2s-dud5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:57:04.176010+00:00 Debian Oval Importer Affected by VCID-sx2t-uzae-2fh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:56:55.682416+00:00 Debian Oval Importer Affected by VCID-mebp-4rfu-vqcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:13:45.359432+00:00 Debian Oval Importer Fixing VCID-8nbc-ethb-6kcn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:04:43.617557+00:00 Debian Oval Importer Affected by VCID-44fx-4w2y-y3dy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:40:30.508733+00:00 Debian Oval Importer Fixing VCID-3tqy-g42y-9fef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:36:35.614142+00:00 Debian Oval Importer Fixing VCID-rftg-byj2-jkh9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:20:52.674976+00:00 Debian Oval Importer Affected by VCID-fhtp-y9a5-vqgj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:20:49.662073+00:00 Debian Oval Importer Affected by VCID-6ze5-dqdn-ykg3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:10:49.164106+00:00 Debian Oval Importer Affected by VCID-6t6n-ws5n-wkay https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:30:28.155620+00:00 Debian Oval Importer Fixing VCID-ay5a-nkmf-5yar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:29:47.299986+00:00 Debian Oval Importer Fixing VCID-k6z6-4pb4-tbeu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:55:12.494263+00:00 Debian Oval Importer Fixing VCID-sb43-hapb-1uf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:54:09.034230+00:00 Debian Oval Importer Fixing VCID-akj7-kh8f-97ct https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:39:56.935048+00:00 Debian Oval Importer Fixing VCID-ses2-y1j2-vbbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:56:09.059243+00:00 Debian Oval Importer Affected by VCID-4twv-1yys-eban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:50:28.752546+00:00 Debian Oval Importer Affected by VCID-khhn-9sja-sfgr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:38:44.699620+00:00 Debian Oval Importer Fixing VCID-e48s-dv1e-4fgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:56:22.181345+00:00 Debian Oval Importer Fixing VCID-ypan-57sx-vyam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:48:43.466197+00:00 Debian Oval Importer Fixing VCID-d7db-n89n-qyd8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:32:39.645249+00:00 Debian Oval Importer Fixing VCID-uj1s-uuyx-mya5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:25:54.527319+00:00 Debian Oval Importer Fixing VCID-pau5-hfbv-nucp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:11:27.116915+00:00 Debian Oval Importer Fixing VCID-c2b8-ss11-9yhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:10:47.966091+00:00 Debian Oval Importer Affected by VCID-3y7d-ujep-4ydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:08:17.596989+00:00 Debian Oval Importer Affected by VCID-jkca-shmj-mbbu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:17:39.733560+00:00 Debian Oval Importer Fixing VCID-qvkt-vk55-4bbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:17:05.977551+00:00 Debian Oval Importer Affected by VCID-7m68-seeq-tuae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:12:24.930682+00:00 Debian Oval Importer Affected by VCID-be57-gxmc-vqd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:12:01.620252+00:00 Debian Oval Importer Affected by VCID-vbs9-gben-9kgc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:09:34.776628+00:00 Debian Oval Importer Fixing VCID-a8j1-24bw-gudu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:57:51.273732+00:00 Debian Oval Importer Fixing VCID-5ykb-6nvx-k3e4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:43:38.055260+00:00 Debian Oval Importer Affected by VCID-qnz1-w7bb-97ee https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:41:59.892385+00:00 Debian Oval Importer Fixing VCID-vsjt-qjyw-hbfs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:37:02.436259+00:00 Debian Oval Importer Fixing VCID-xbb2-av4z-m3dp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:35:37.623689+00:00 Debian Oval Importer Affected by VCID-s8du-gzj2-gkc1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:34:04.636797+00:00 Debian Oval Importer Fixing VCID-fwp2-z586-ebbq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:20:11.796528+00:00 Debian Oval Importer Fixing VCID-huf2-qwju-6bf2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:11:44.275025+00:00 Debian Oval Importer Fixing VCID-9swv-zvke-ubet https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:11:30.050385+00:00 Debian Oval Importer Fixing VCID-34z4-1zqk-afcm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:06:19.038165+00:00 Debian Oval Importer Affected by VCID-y683-kz6e-afhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:01:34.522788+00:00 Debian Oval Importer Fixing VCID-h3qa-svy4-1fcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:42:30.459902+00:00 Debian Oval Importer Affected by VCID-xdbp-7rtr-fyb7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:25:04.819344+00:00 Debian Oval Importer Affected by VCID-85gc-u991-z3dw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:20:54.371269+00:00 Debian Oval Importer Affected by VCID-hj89-pnag-3fer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:03:29.736585+00:00 Debian Oval Importer Fixing VCID-ws4h-295a-9qgx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:02:53.974597+00:00 Debian Oval Importer Fixing VCID-cre7-1uhc-bka2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:02:47.839028+00:00 Debian Oval Importer Fixing VCID-xpvn-y3b8-skgb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-02T17:16:56.669567+00:00 Debian Importer Affected by VCID-zxu5-equ9-1kam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:55.835153+00:00 Debian Importer Affected by VCID-xkkm-ss3p-1udc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:01.916937+00:00 Debian Importer Affected by VCID-pxqa-nkv3-jqfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:49.783313+00:00 Debian Importer Affected by VCID-cqr3-wwhj-tyck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:16.583165+00:00 Debian Importer Affected by VCID-4e5y-1s19-r7g7 https://security-tracker.debian.org/tracker/data/json 38.1.0