Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
purl pkg:deb/debian/clamav@1.4.3%2Bdfsg-1~deb12u2?distro=trixie
Next non-vulnerable version 1.4.4+dfsg-1
Latest non-vulnerable version 1.4.4+dfsg-1
Risk
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-5kba-63mx-hya7
Aliases:
CVE-2026-20031
A vulnerability in the HTML Cascading Style Sheets (CSS) module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when splitting UTF-8 strings. An attacker could exploit this vulnerability by submitting a crafted HTML file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the scanning process.
1.4.4+dfsg-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (167)
Vulnerability Summary Aliases
VCID-1346-uavy-pbdb Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1787
VCID-14ba-3s5a-2ff3 Unspecified vulnerability in ClamAV before 0.88.5 allows remote attackers to cause a denial of service (scanning service crash) via a crafted Compressed HTML Help (CHM) file that causes ClamAV to "read an invalid memory location." CVE-2006-5295
VCID-1vcc-2zf5-tyd1 Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file format processors in libclamav for Clam AntiVirus (ClamAV) 0.86.1 and earlier allow remote attackers to gain privileges via a crafted e-mail message. CVE-2005-2450
VCID-2aju-u36p-gug9 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20796
VCID-2r3h-sgxr-ffdz Multiple vulnerabilities have been reported in Clam AntiVirus. CVE-2010-1311
VCID-32nc-x9aw-a3fb ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system. CVE-2019-12625
VCID-3g47-n64z-bqbb clamav: security fixes in upstream 0.95 (CVE-2008-6680, CVE-2009-1270) CVE-2009-1241
VCID-3rrt-vgz7-8bgz Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-2221
VCID-3uwh-y2m1-nugc Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2018-1000085
VCID-3v58-x48y-jug2 Multiple vulnerabilities have been discovered in ClamAV allowing for the remote execution of arbitrary code. CVE-2007-1745
VCID-4eva-e818-yfgq libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document, aka Bug IDs CSCuv78533 and CSCuw60503. CVE-2016-1405
VCID-4nbm-18gn-q7bt Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2013-2020
VCID-4z4r-2w8m-r7dz Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2023-20032
VCID-4zzn-3akx-qyav Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-2713
VCID-568z-e7ep-dbdz Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20803
VCID-5hnm-hz17-2bey Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-15961
VCID-5tr5-pbwa-kyhs Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-1463
VCID-5ye8-ycmx-6qga Vulnerabilities have been discovered in ClamAV allowing remote execution of arbitrary code and Denial of Service attacks. CVE-2007-4560
VCID-63vt-1nc8-6kfc A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process. CVE-2025-20260
VCID-6cre-dvhv-tyfb ClamAV contains two vulnerabilities allowing a Denial of Service. CVE-2007-0897
VCID-6vfe-sqh5-33fd The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. CVE-2012-1459
PYSEC-2012-26
VCID-7dcd-v8q9-b3bv Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2018-15378
VCID-83fz-ctpv-yuew ClamAV contains multiple vulnerabilities that could lead to remote execution of arbitrary code or cause an application crash. CVE-2006-1615
VCID-89nm-dhhw-rudd Multiple vulnerabilities have been reported in Clam AntiVirus. CVE-2010-1640
VCID-8dsa-zr5u-vya3 clamav 0.91.2 suffers from a floating point exception when using ScanOLE2. CVE-2007-6745
VCID-8j4p-qa4k-g3ee Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2013-7088
VCID-8qrk-wpj8-ekfk ClamAV has many security flaws which make it vulnerable to remote execution of arbitrary code and a Denial of Service. CVE-2005-3501
VCID-8s2g-2brb-tfhq Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1786
VCID-8vyy-rhvj-9uba A vulnerability has been discovered in ClamAV, allowing for a Denial of Service. CVE-2007-3725
VCID-8y9g-m17c-kyey ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable. CVE-2016-1371
VCID-93n4-278h-dydh Two vulnerabilities in ClamAV may allow for the remote execution of arbitrary code or a Denial of Service. CVE-2008-5314
VCID-9yte-e44v-skb7 ClamAV contains several vulnerabilities leading to a Denial of Service. CVE-2007-3023
VCID-9zc3-mqdn-ufd2 ClamAV is vulnerable to a heap-based buffer overflow potentially allowing remote execution of arbitrary code and a Denial of Service. CVE-2006-4182
VCID-a1px-egkx-qkgd ClamAV has many security flaws which make it vulnerable to remote execution of arbitrary code and a Denial of Service. CVE-2005-3500
VCID-a4nz-5cr8-13an Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1789
VCID-a759-t1gf-y7b3 Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2011-3627
VCID-aagg-bbac-rfez Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2017-6420
VCID-afs1-pn6y-2qej The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function. CVE-2005-3239
VCID-age6-uz2c-5kb7 Multiple vulnerabilities have been reported in Clam AntiVirus. CVE-2010-1639
VCID-auz9-64vf-7qdp Two vulnerabilities in ClamAV may allow for the remote execution of arbitrary code or a Denial of Service. CVE-2008-5050
VCID-avvd-1gv9-eyb9 Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2018-0202
VCID-axqc-hqfs-1fg1 Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-0318
VCID-azhe-cxb8-3kbb Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2010-0405
VCID-b43h-aewb-hqfh Multiple vulnerabilities have been discovered in ClamAV allowing remote execution of arbitrary code and Denial of Service attacks. CVE-2007-6337
VCID-b8av-4cra-33em The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. CVE-2012-1457
PYSEC-2012-25
VCID-bcbq-sbmz-ayd1 Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2014-9328
VCID-beus-rm7h-3qga clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file. CVE-2013-6497
VCID-bjvz-w7s1-zfbj ClamAV has many security flaws which make it vulnerable to remote execution of arbitrary code and a Denial of Service. CVE-2005-3587
VCID-c9ze-8411-kfb7 Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2010-3434
VCID-cc9p-w184-zfej Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2020-3327
VCID-ccdb-7g4p-bugy Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1100
VCID-cexz-mrrc-v3gp Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2013-2021
VCID-cysq-fdzg-13dd ClamAV versions prior to 0.103.0-rc contain a vulnerability in function name processing through the ClamBC bytecode interpreter that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine. CVE-2020-37167
VCID-d3u3-epeb-guh9 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2023-20052
VCID-d456-cjy8-d7bs ClamAV 0.80 and earlier allows remote attackers to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers. CVE-2005-0133
VCID-dfvv-cqbj-mubr Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-2222
VCID-dn26-zfsc-ryec Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20785
VCID-e3qs-51ap-nkbz Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2011-2721
VCID-edx7-wgfh-cuaq ClamAV contains several vulnerabilities leading to a Denial of Service. CVE-2007-3122
VCID-eek7-jgkz-akdh ClamAV is vulnerable to a heap-based buffer overflow resulting in a Denial of Service and potentially remote execution of arbitrary code. CVE-2006-4018
VCID-egd5-p68y-wfdy A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition. CVE-2021-1404
VCID-emwr-t3hg-xqdx Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-3215
VCID-et1s-49mc-v7ej Multiple vulnerabilities have been discovered in ClamAV allowing remote execution of arbitrary code and Denial of Service attacks. CVE-2007-6336
VCID-f2br-quyp-v3ax The MS-Expand file handling in Clam AntiVirus (ClamAV) before 0.86 allows remote attackers to cause a denial of service (file descriptor and memory consumption) via a crafted file that causes repeated errors in the cli_msexpand function. CVE-2005-1922
VCID-f4wy-kf5n-5bhv Format string vulnerability in clamav-milter for Clam AntiVirus 0.60 through 0.60p, and other versions before 0.65, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the email address argument of a "MAIL FROM" command. CVE-2003-0946
VCID-f8wt-f14e-s7d6 Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-3913
VCID-fbpv-4xce-tqa1 ClamAV contains two vulnerabilities allowing a Denial of Service. CVE-2007-0898
VCID-fg72-nbqy-mqgs freshclam in ClamAV in Apple Mac OS X 10.5.8 with Security Update 2009-005 has an incorrect launchd.plist ProgramArguments key and consequently does not run, which might allow remote attackers to introduce viruses into the system. CVE-2010-0058
VCID-fmz4-958p-xqe6 Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2010-4479
VCID-fp31-7krz-abbs Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20770
VCID-fsn5-241x-f7b2 Multiple vulnerabilities in ClamAV allow for the remote execution of arbitrary code or Denial of Service. CVE-2009-1372
VCID-fvmm-4zme-a3at File descriptor leak in the PDF handler in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service via a crafted PDF file. CVE-2007-2029
VCID-fw2y-5rmc-uyd2 Buffer overflow in libclamav/upx.c in Clam AntiVirus (ClamAV) before 0.87 allows remote attackers to execute arbitrary code via a crafted UPX packed executable. CVE-2005-2920
VCID-gfff-zanp-aqb9 ClamAV is vulnerable to Denial of Service. CVE-2006-6481
VCID-gg41-q6x3-bbbw Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-2668
VCID-ggz7-h35v-p7ep Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20505
VCID-guz8-mfzu-uuc9 Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2017-6419
VCID-h46v-x33x-t3ep Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2018-0360
VCID-h776-h6y3-ufcu Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. CVE-2006-6406
VCID-hch1-2kkj-qubf clamav does not recognize Base64-UUEncoded files CVE-2007-6596
VCID-hk1f-z2vm-dfeq Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2011-1003
VCID-j2gt-uvam-hufk Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12377
VCID-j4gm-njhq-6ygk Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference. CVE-2006-5874
VCID-j6w1-zy8u-sbc1 Multiple vulnerabilities in ClamAV allow for the remote execution of arbitrary code or Denial of Service. CVE-2008-6680
VCID-jcfy-dyqj-h3aw A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . CVE-2025-20234
VCID-jdn6-r2vx-6fbh Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions. CVE-2007-3025
VCID-jn71-tnyw-cqdu The unpack feature in ClamAV 0.93.3 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a corrupted LZH file. CVE-2008-6845
VCID-k4w5-5g16-x3b2 Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1835
VCID-k8az-72sh-cuer ClamAV contains several vulnerabilities leading to a Denial of Service. CVE-2007-2650
VCID-kh69-m841-jbbk There is a possible heap overflow in libclamav/fsg.c before 0.100.0. CVE-2007-0899
VCID-ku97-h544-fua1 Multiple vulnerabilities have been discovered in ClamAV allowing for the remote execution of arbitrary code. CVE-2007-1997
VCID-kurn-1uay-qqap Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20792
VCID-m5un-q736-5khr Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2010-4260
VCID-mdfk-5ked-t3bu Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2023-20197
VCID-mu6w-nub4-z3ef Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20698
VCID-mufb-kvfq-mubz Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1785
VCID-n51n-m2r7-kbdy bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). CVE-2019-12900
VCID-new8-u5x9-nkeb A vulnerability in ClamAV could lead to a Denial of Service condition. CVE-2021-1405
VCID-nr6r-rxtg-h3d1 With a specific configuration (using %f in the VirusEvent parameter), Clam AntiVirus is vulnerable to an attack allowing execution of arbitrary commands. CVE-2004-1876
VCID-ntvt-zdsj-1fgt Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2017-6418
VCID-nu3x-4yc8-ufg6 Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2018-0361
VCID-p14n-mfwj-vufs Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1836
VCID-p21f-gaf4-3bcw Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-0314
VCID-p4qp-2b79-akhw Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-0728
VCID-p5hg-2rdb-z3hq Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1788
VCID-p5qn-njcb-1fdr Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-1461
VCID-pmub-shqe-ubbt The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file. CVE-2005-3303
VCID-pty8-xunq-huf3 Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-3914
VCID-pwm2-bk7k-j7cm Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-1462
VCID-pxt8-5rha-kkf8 ClamAV contains multiple vulnerabilities that could lead to remote execution of arbitrary code or cause an application crash. CVE-2006-1630
VCID-pzw9-7mr3-kugx A vulnerability in Clam AntiVirus can lead to a Denial of Service condition. CVE-2014-9050
VCID-q9rb-p3vk-5uaa Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2007-6595
VCID-qacw-bby8-9kdg Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2019-1798
VCID-qc9z-s9xt-1baw Multiple vulnerabilities in ClamAV allow for the remote execution of arbitrary code or Denial of Service. CVE-2009-1270
VCID-qvz2-bk3f-7bch The TAR file parser in ClamAV 0.96.4 and Quick Heal (aka Cat QuickHeal) 11.00 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. CVE-2012-1419
VCID-qwwa-mf8k-2fdc Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12378
VCID-rdv9-ec51-9qg9 Multiple vulnerabilities in ClamAV allow for the remote execution of arbitrary code or Denial of Service. CVE-2009-1371
VCID-rhj5-gtyt-2ucn A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software. CVE-2024-20380
VCID-s15m-qwrh-bqdq The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) 0.83, and other versions vefore 0.86, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff, which causes a zero-length read. CVE-2005-1923
VCID-s22j-vmt3-6qaa ClamAV is vulnerable to a denial of service attack when processing certain RAR archives. CVE-2004-1909
VCID-s3kf-5t6w-c7hm libclamav in Clam AntiVirus 0.65 allows remote attackers to cause a denial of service (crash) via a uuencoded e-mail message with an invalid line length (e.g., a lowercase character), which causes an assert error in clamd that terminates the calling program. CVE-2004-0270
VCID-sbbh-2bet-gyaz The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations. CVE-2012-1458
VCID-seed-bera-73ez Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12379
VCID-sq4f-krz1-87fw Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20290
VCID-ssb2-q4q7-hqhh ClamAV contains several vulnerabilities leading to a Denial of Service. CVE-2007-3024
VCID-t74n-k2kq-z3hv ClamAV is vulnerable to a buffer overflow which may lead to remote execution of arbitrary code. CVE-2006-0162
VCID-th8f-btfy-1yg4 The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading. CVE-2005-2070
VCID-tj9r-n16b-7uam ClamAV contains two vulnerabilities that could lead to Denial of Service and evasion of virus scanning. CVE-2005-0218
VCID-tpcz-e492-efdk Multiple vulnerabilities have been reported in Clam AntiVirus. CVE-2010-0098
VCID-tzph-y73s-6qb9 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. CVE-2022-20771
VCID-tzrt-nka9-67hh Multiple vulnerabilities were found in Clam AntiVirus, the most severe of which may allow the execution of arbitrary code. CVE-2010-4261
VCID-u3pj-kant-effb Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2020-3123
VCID-u4q5-6h15-guf2 Multiple interpretation error in unspecified versions of ClamAV Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. CVE-2005-3229
VCID-u4qp-vcnh-c3dd Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12374
VCID-umkp-zyee-sqac ClamAV contains several vulnerabilities leading to a Denial of Service. CVE-2007-3123
VCID-uvbv-aeft-jyay Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1837
VCID-uzg5-a999-afhp security update CVE-2015-2305
VCID-uzyz-uw16-7ufk Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service. CVE-2015-2170
VCID-v7xg-3h2f-1yd2 Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2013-7087
VCID-vbmy-urt6-myha A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-3341
VCID-vdeg-psw7-ckej Clam AntiVirus is vulnerable to a Denial of Service attack when processing certain Quantum archives. CVE-2005-2056
VCID-vdhk-r67a-s3fr A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. CVE-2025-20128
VCID-vhv6-2yu5-wbb3 freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file. CVE-2006-2427
VCID-vqyc-hxfb-ufav ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file. CVE-2016-1372
VCID-vzhw-bgs7-sye3 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2023-20212
VCID-w94u-kcpw-4ub2 Freshclam is vulnerable to a buffer overflow that could lead to execution of arbitrary code. CVE-2006-1989
VCID-wjvc-p75d-p3a9 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20506
VCID-x538-vjsv-3ud8 Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-1389
VCID-xbuy-fyct-tqcz Vulnerabilities have been discovered in ClamAV allowing remote execution of arbitrary code and Denial of Service attacks. CVE-2007-4510
VCID-xfzw-afgg-fqdc Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2020-3481
VCID-xp7y-un7p-rbgp Multiple vulnerabilities in ClamAV may result in a Denial of Service. CVE-2008-3912
VCID-xwgq-w8k4-xbcn A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition. CVE-2021-1252
VCID-xyb8-pe6q-sbby The Ubuntu clamav-milter.init script in clamav-milter before 0.95.1+dfsg-1ubuntu1.2 in Ubuntu 9.04 sets the ownership of the current working directory to the clamav account, which might allow local users to bypass intended access restrictions via read or write operations involving this directory. CVE-2009-1601
VCID-xzye-g5rw-fyh5 Multiple vulnerabilities have been found in GraphicsMagick, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. CVE-2009-3736
VCID-y1wr-yddc-9kf8 Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1387
VCID-y3k7-e14w-xqbn Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12375
VCID-y4s3-fzav-27g5 Multiple vulnerabilities have been discovered in ClamAV allowing remote execution of arbitrary code and Denial of Service attacks. CVE-2007-6335
VCID-y5h1-n12a-ebg5 Multiple vulnerabilities have been found in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2013-7089
VCID-y5mg-rpf8-cbe7 Multiple vulnerabilities have been found in ClamAV, the worst of which may allow remote attackers to execute arbitrary code. CVE-2017-11423
VCID-yuub-nqnn-qyg6 Multiple vulnerabilities have been discovered in ClamAV, the worst of which could lead to arbitrary code execution. CVE-2024-20328
VCID-z2zq-jbdg-zke4 Multiple vulnerabilities in ClamAV may result in the remote execution of arbitrary code. CVE-2008-1833
VCID-z7du-zx2w-nubk ClamAV 0.94.1 and possibly 0.93.1, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. CVE-2008-5525
VCID-zbkr-bd4m-77cs Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12380
VCID-zd3n-bhwe-xqej ClamAV contains multiple vulnerabilities that could lead to remote execution of arbitrary code or cause an application crash. CVE-2006-1614
VCID-zeub-1qhs-pyfh Multiple vulnerabilities have been found in ClamAV, the worst of which could result in a Denial of Service condition. CVE-2020-3350
VCID-zfuc-jbs7-a7c5 libclamav/fsg.c in Clam AntiVirus (ClamAV) before 0.87 allows remote attackers to cause a denial of service (infinite loop) via a crafted FSG packed executable. CVE-2005-2919
VCID-zys1-2pnp-h3an Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code. CVE-2017-12376

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-14T12:17:01.571083+00:00 Debian Importer Fixing VCID-cysq-fdzg-13dd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T12:47:30.881359+00:00 Debian Importer Affected by VCID-5kba-63mx-hya7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:20:32.704033+00:00 Debian Importer Fixing VCID-fmz4-958p-xqe6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:19:32.645239+00:00 Debian Importer Fixing VCID-8qrk-wpj8-ekfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:19:20.171853+00:00 Debian Importer Fixing VCID-9yte-e44v-skb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:17:42.420412+00:00 Debian Importer Fixing VCID-a4nz-5cr8-13an https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:57.261577+00:00 Debian Importer Fixing VCID-a759-t1gf-y7b3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:36.289078+00:00 Debian Importer Fixing VCID-zeub-1qhs-pyfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:03.606625+00:00 Debian Importer Fixing VCID-32nc-x9aw-a3fb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:13:42.457387+00:00 Debian Importer Fixing VCID-fp31-7krz-abbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:26.563498+00:00 Debian Importer Fixing VCID-cc9p-w184-zfej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:03.147561+00:00 Debian Importer Fixing VCID-m5un-q736-5khr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:47.512159+00:00 Debian Importer Fixing VCID-y4s3-fzav-27g5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:47.212430+00:00 Debian Importer Fixing VCID-nr6r-rxtg-h3d1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:15.026370+00:00 Debian Importer Fixing VCID-xyb8-pe6q-sbby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:20.878335+00:00 Debian Importer Fixing VCID-age6-uz2c-5kb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:30.195104+00:00 Debian Importer Fixing VCID-2aju-u36p-gug9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:42.864579+00:00 Debian Importer Fixing VCID-bjvz-w7s1-zfbj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:49.517820+00:00 Debian Importer Fixing VCID-p21f-gaf4-3bcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:56:08.899543+00:00 Debian Importer Fixing VCID-xwgq-w8k4-xbcn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:26.365847+00:00 Debian Importer Fixing VCID-6vfe-sqh5-33fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:12.780714+00:00 Debian Importer Fixing VCID-y1wr-yddc-9kf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:06.843672+00:00 Debian Importer Fixing VCID-u3pj-kant-effb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:50.525695+00:00 Debian Importer Fixing VCID-j2gt-uvam-hufk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:19.802898+00:00 Debian Importer Fixing VCID-c9ze-8411-kfb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:15.674631+00:00 Debian Importer Fixing VCID-hk1f-z2vm-dfeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:53.977993+00:00 Debian Importer Fixing VCID-pzw9-7mr3-kugx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:44:18.003716+00:00 Debian Importer Fixing VCID-vdeg-psw7-ckej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:48.175676+00:00 Debian Importer Fixing VCID-uvbv-aeft-jyay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:40:14.154925+00:00 Debian Importer Fixing VCID-5tr5-pbwa-kyhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:24.415970+00:00 Debian Importer Fixing VCID-vdhk-r67a-s3fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:10.295248+00:00 Debian Importer Fixing VCID-1vcc-2zf5-tyd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:33.271484+00:00 Debian Importer Fixing VCID-9zc3-mqdn-ufd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:02.201472+00:00 Debian Importer Fixing VCID-rdv9-ec51-9qg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:30.320644+00:00 Debian Importer Fixing VCID-3rrt-vgz7-8bgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:46.079620+00:00 Debian Importer Fixing VCID-xp7y-un7p-rbgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:26.351977+00:00 Debian Importer Fixing VCID-fbpv-4xce-tqa1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:04.370549+00:00 Debian Importer Fixing VCID-d456-cjy8-d7bs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:00.861329+00:00 Debian Importer Fixing VCID-guz8-mfzu-uuc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:19:45.768632+00:00 Debian Importer Fixing VCID-h46v-x33x-t3ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:28.191026+00:00 Debian Importer Fixing VCID-jdn6-r2vx-6fbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:07.320812+00:00 Debian Importer Fixing VCID-uzg5-a999-afhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:43.127438+00:00 Debian Importer Fixing VCID-b8av-4cra-33em https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:17.770484+00:00 Debian Importer Fixing VCID-qc9z-s9xt-1baw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:01.036901+00:00 Debian Importer Fixing VCID-8dsa-zr5u-vya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:48.463351+00:00 Debian Importer Fixing VCID-j6w1-zy8u-sbc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:43.792166+00:00 Debian Importer Fixing VCID-gfff-zanp-aqb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:10.468799+00:00 Debian Importer Fixing VCID-3g47-n64z-bqbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:32.606826+00:00 Debian Importer Fixing VCID-j4gm-njhq-6ygk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:56.225468+00:00 Debian Importer Fixing VCID-a1px-egkx-qkgd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:58.274746+00:00 Debian Importer Fixing VCID-h776-h6y3-ufcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:54.972282+00:00 Debian Importer Fixing VCID-f4wy-kf5n-5bhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:10.786383+00:00 Debian Importer Fixing VCID-vhv6-2yu5-wbb3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:01.541380+00:00 Debian Importer Fixing VCID-4eva-e818-yfgq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:47.526955+00:00 Debian Importer Fixing VCID-568z-e7ep-dbdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:27.702442+00:00 Debian Importer Fixing VCID-fw2y-5rmc-uyd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:42.103372+00:00 Debian Importer Fixing VCID-mu6w-nub4-z3ef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:41.686301+00:00 Debian Importer Fixing VCID-p5qn-njcb-1fdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:55.952274+00:00 Debian Importer Fixing VCID-s22j-vmt3-6qaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:25.239314+00:00 Debian Importer Fixing VCID-y5mg-rpf8-cbe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:09.819313+00:00 Debian Importer Fixing VCID-umkp-zyee-sqac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:52.260199+00:00 Debian Importer Fixing VCID-pmub-shqe-ubbt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:43.800547+00:00 Debian Importer Fixing VCID-afs1-pn6y-2qej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:38.304617+00:00 Debian Importer Fixing VCID-93n4-278h-dydh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:28.858168+00:00 Debian Importer Fixing VCID-fg72-nbqy-mqgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:46.370114+00:00 Debian Importer Fixing VCID-tpcz-e492-efdk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:31.357978+00:00 Debian Importer Fixing VCID-d3u3-epeb-guh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:07.581415+00:00 Debian Importer Fixing VCID-q9rb-p3vk-5uaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:44:58.758612+00:00 Debian Importer Fixing VCID-4nbm-18gn-q7bt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:44:10.769637+00:00 Debian Importer Fixing VCID-beus-rm7h-3qga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:40.609603+00:00 Debian Importer Fixing VCID-y5h1-n12a-ebg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:52.576109+00:00 Debian Importer Fixing VCID-zfuc-jbs7-a7c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:41.252729+00:00 Debian Importer Fixing VCID-ggz7-h35v-p7ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:34.202925+00:00 Debian Importer Fixing VCID-seed-bera-73ez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:48.256463+00:00 Debian Importer Fixing VCID-yuub-nqnn-qyg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:56.516111+00:00 Debian Importer Fixing VCID-5hnm-hz17-2bey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:09.178775+00:00 Debian Importer Fixing VCID-8s2g-2brb-tfhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:45.745212+00:00 Debian Importer Fixing VCID-vzhw-bgs7-sye3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:12.735977+00:00 Debian Importer Fixing VCID-emwr-t3hg-xqdx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:42.184450+00:00 Debian Importer Fixing VCID-3uwh-y2m1-nugc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:27.450811+00:00 Debian Importer Fixing VCID-zbkr-bd4m-77cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:13.877689+00:00 Debian Importer Fixing VCID-auz9-64vf-7qdp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:24.648831+00:00 Debian Importer Fixing VCID-ntvt-zdsj-1fgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:43.473631+00:00 Debian Importer Fixing VCID-eek7-jgkz-akdh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:08.319425+00:00 Debian Importer Fixing VCID-mufb-kvfq-mubz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:03.073203+00:00 Debian Importer Fixing VCID-egd5-p68y-wfdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:05.590622+00:00 Debian Importer Fixing VCID-cexz-mrrc-v3gp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:45.533493+00:00 Debian Importer Fixing VCID-qvz2-bk3f-7bch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:42.214271+00:00 Debian Importer Fixing VCID-xfzw-afgg-fqdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:37.334667+00:00 Debian Importer Fixing VCID-p5hg-2rdb-z3hq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:45.390822+00:00 Debian Importer Fixing VCID-8j4p-qa4k-g3ee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:56.147329+00:00 Debian Importer Fixing VCID-mdfk-5ked-t3bu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:16.076812+00:00 Debian Importer Fixing VCID-hch1-2kkj-qubf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:24.899140+00:00 Debian Importer Fixing VCID-5ye8-ycmx-6qga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:59.472469+00:00 Debian Importer Fixing VCID-89nm-dhhw-rudd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:23.304128+00:00 Debian Importer Fixing VCID-z7du-zx2w-nubk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:28.169728+00:00 Debian Importer Fixing VCID-14ba-3s5a-2ff3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:30.068883+00:00 Debian Importer Fixing VCID-xbuy-fyct-tqcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:39.013331+00:00 Debian Importer Fixing VCID-bcbq-sbmz-ayd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:38.974428+00:00 Debian Importer Fixing VCID-qwwa-mf8k-2fdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:44.228189+00:00 Debian Importer Fixing VCID-new8-u5x9-nkeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:04.804712+00:00 Debian Importer Fixing VCID-p14n-mfwj-vufs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:39.644165+00:00 Debian Importer Fixing VCID-kurn-1uay-qqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:03.186515+00:00 Debian Importer Fixing VCID-jcfy-dyqj-h3aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:27.357341+00:00 Debian Importer Fixing VCID-b43h-aewb-hqfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:48.781195+00:00 Debian Importer Fixing VCID-ccdb-7g4p-bugy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:43.675090+00:00 Debian Importer Fixing VCID-jn71-tnyw-cqdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:11.020801+00:00 Debian Importer Fixing VCID-tj9r-n16b-7uam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:08.620280+00:00 Debian Importer Fixing VCID-vqyc-hxfb-ufav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:43.366562+00:00 Debian Importer Fixing VCID-pxt8-5rha-kkf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:24.746732+00:00 Debian Importer Fixing VCID-dfvv-cqbj-mubr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:22.034666+00:00 Debian Importer Fixing VCID-6cre-dvhv-tyfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:59.888029+00:00 Debian Importer Fixing VCID-4zzn-3akx-qyav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:49.905554+00:00 Debian Importer Fixing VCID-2r3h-sgxr-ffdz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:10.832376+00:00 Debian Importer Fixing VCID-tzrt-nka9-67hh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:41.548911+00:00 Debian Importer Fixing VCID-w94u-kcpw-4ub2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:58.778052+00:00 Debian Importer Fixing VCID-et1s-49mc-v7ej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:44.709289+00:00 Debian Importer Fixing VCID-k8az-72sh-cuer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:38.086319+00:00 Debian Importer Fixing VCID-t74n-k2kq-z3hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:17.333218+00:00 Debian Importer Fixing VCID-rhj5-gtyt-2ucn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:37.908371+00:00 Debian Importer Fixing VCID-vbmy-urt6-myha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:40.122713+00:00 Debian Importer Fixing VCID-x538-vjsv-3ud8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:34.778324+00:00 Debian Importer Fixing VCID-s3kf-5t6w-c7hm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:02.593915+00:00 Debian Importer Fixing VCID-z2zq-jbdg-zke4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:00.204465+00:00 Debian Importer Fixing VCID-edx7-wgfh-cuaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:49.343248+00:00 Debian Importer Fixing VCID-8vyy-rhvj-9uba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:22.222079+00:00 Debian Importer Fixing VCID-sq4f-krz1-87fw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:32.921596+00:00 Debian Importer Fixing VCID-s15m-qwrh-bqdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:39.344683+00:00 Debian Importer Fixing VCID-f2br-quyp-v3ax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:29:28.444153+00:00 Debian Importer Fixing VCID-zys1-2pnp-h3an https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:47:57.129191+00:00 Debian Importer Fixing VCID-7dcd-v8q9-b3bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:45.178264+00:00 Debian Importer Fixing VCID-e3qs-51ap-nkbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:12.009081+00:00 Debian Importer Fixing VCID-tzph-y73s-6qb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:33.511110+00:00 Debian Importer Fixing VCID-fsn5-241x-f7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:22.590322+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:54.479655+00:00 Debian Importer Fixing VCID-f8wt-f14e-s7d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:25.000388+00:00 Debian Importer Fixing VCID-kh69-m841-jbbk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:58.732630+00:00 Debian Importer Fixing VCID-ssb2-q4q7-hqhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:20.129560+00:00 Debian Importer Fixing VCID-v7xg-3h2f-1yd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:02.540230+00:00 Debian Importer Fixing VCID-wjvc-p75d-p3a9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.592724+00:00 Debian Importer Fixing VCID-sbbh-2bet-gyaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:44.581766+00:00 Debian Importer Fixing VCID-fvmm-4zme-a3at https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:28.636813+00:00 Debian Importer Fixing VCID-4z4r-2w8m-r7dz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:12.311242+00:00 Debian Importer Fixing VCID-p4qp-2b79-akhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:45.275316+00:00 Debian Importer Fixing VCID-uzyz-uw16-7ufk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:35.021265+00:00 Debian Importer Fixing VCID-pwm2-bk7k-j7cm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:23.682939+00:00 Debian Importer Fixing VCID-63vt-1nc8-6kfc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:25.844274+00:00 Debian Importer Fixing VCID-ku97-h544-fua1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:23.945618+00:00 Debian Importer Fixing VCID-k4w5-5g16-x3b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:12.432761+00:00 Debian Importer Fixing VCID-n51n-m2r7-kbdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:37.568120+00:00 Debian Importer Fixing VCID-y3k7-e14w-xqbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:09.364481+00:00 Debian Importer Fixing VCID-83fz-ctpv-yuew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:46.306496+00:00 Debian Importer Fixing VCID-u4qp-vcnh-c3dd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:41.863264+00:00 Debian Importer Fixing VCID-8y9g-m17c-kyey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:39.806134+00:00 Debian Importer Fixing VCID-u4q5-6h15-guf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:31.291637+00:00 Debian Importer Fixing VCID-nu3x-4yc8-ufg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:57.424935+00:00 Debian Importer Fixing VCID-zd3n-bhwe-xqej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:46.824709+00:00 Debian Importer Fixing VCID-dn26-zfsc-ryec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:39.823043+00:00 Debian Importer Fixing VCID-gg41-q6x3-bbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:16.963912+00:00 Debian Importer Fixing VCID-pty8-xunq-huf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:52.825502+00:00 Debian Importer Fixing VCID-aagg-bbac-rfez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:47.317799+00:00 Debian Importer Fixing VCID-1346-uavy-pbdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:42.339571+00:00 Debian Importer Fixing VCID-axqc-hqfs-1fg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:02.287226+00:00 Debian Importer Fixing VCID-th8f-btfy-1yg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:05.734914+00:00 Debian Importer Fixing VCID-qacw-bby8-9kdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:45.902395+00:00 Debian Importer Fixing VCID-3v58-x48y-jug2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:27.800501+00:00 Debian Importer Fixing VCID-avvd-1gv9-eyb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:14.385382+00:00 Debian Importer Fixing VCID-azhe-cxb8-3kbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:49.863152+00:00 Debian Importer Fixing VCID-fmz4-958p-xqe6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:46.675884+00:00 Debian Importer Fixing VCID-8qrk-wpj8-ekfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:46.503244+00:00 Debian Importer Fixing VCID-9yte-e44v-skb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:38.776101+00:00 Debian Importer Fixing VCID-a4nz-5cr8-13an https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:36.147150+00:00 Debian Importer Fixing VCID-a759-t1gf-y7b3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:35.202536+00:00 Debian Importer Fixing VCID-zeub-1qhs-pyfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:32.430427+00:00 Debian Importer Fixing VCID-32nc-x9aw-a3fb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:16.264704+00:00 Debian Importer Fixing VCID-fp31-7krz-abbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:05.004649+00:00 Debian Importer Fixing VCID-cc9p-w184-zfej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:03.119339+00:00 Debian Importer Fixing VCID-m5un-q736-5khr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:54.311067+00:00 Debian Importer Fixing VCID-y4s3-fzav-27g5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:54.278846+00:00 Debian Importer Fixing VCID-nr6r-rxtg-h3d1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:53.743632+00:00 Debian Importer Fixing VCID-xyb8-pe6q-sbby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:34.585353+00:00 Debian Importer Fixing VCID-age6-uz2c-5kb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:24.753887+00:00 Debian Importer Fixing VCID-2aju-u36p-gug9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:11.174373+00:00 Debian Importer Fixing VCID-bjvz-w7s1-zfbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:07.313829+00:00 Debian Importer Fixing VCID-p21f-gaf4-3bcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:56.799523+00:00 Debian Importer Fixing VCID-xwgq-w8k4-xbcn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:41.863904+00:00 Debian Importer Fixing VCID-6vfe-sqh5-33fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:36.815439+00:00 Debian Importer Fixing VCID-y1wr-yddc-9kf8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:30.417944+00:00 Debian Importer Fixing VCID-u3pj-kant-effb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:21.897264+00:00 Debian Importer Fixing VCID-j2gt-uvam-hufk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:18.270806+00:00 Debian Importer Fixing VCID-c9ze-8411-kfb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:16.406077+00:00 Debian Importer Fixing VCID-hk1f-z2vm-dfeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:15.321014+00:00 Debian Importer Fixing VCID-pzw9-7mr3-kugx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:02.871002+00:00 Debian Importer Fixing VCID-vdeg-psw7-ckej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:56.234896+00:00 Debian Importer Fixing VCID-uvbv-aeft-jyay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:43.983574+00:00 Debian Importer Fixing VCID-5tr5-pbwa-kyhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:39.439447+00:00 Debian Importer Fixing VCID-vdhk-r67a-s3fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:31.935831+00:00 Debian Importer Fixing VCID-1vcc-2zf5-tyd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:15.365435+00:00 Debian Importer Fixing VCID-9zc3-mqdn-ufd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:13.460198+00:00 Debian Importer Fixing VCID-rdv9-ec51-9qg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:10.721818+00:00 Debian Importer Fixing VCID-3rrt-vgz7-8bgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:48.393340+00:00 Debian Importer Fixing VCID-xp7y-un7p-rbgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:35.022343+00:00 Debian Importer Fixing VCID-fbpv-4xce-tqa1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:34.256434+00:00 Debian Importer Fixing VCID-d456-cjy8-d7bs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:20.983650+00:00 Debian Importer Fixing VCID-guz8-mfzu-uuc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:00.314269+00:00 Debian Importer Fixing VCID-h46v-x33x-t3ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:42.039780+00:00 Debian Importer Fixing VCID-jdn6-r2vx-6fbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:36.016385+00:00 Debian Importer Fixing VCID-uzg5-a999-afhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:34.304129+00:00 Debian Importer Fixing VCID-b8av-4cra-33em https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:26.941548+00:00 Debian Importer Fixing VCID-qc9z-s9xt-1baw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:17.941573+00:00 Debian Importer Fixing VCID-8dsa-zr5u-vya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:17.606944+00:00 Debian Importer Fixing VCID-j6w1-zy8u-sbc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:17.440547+00:00 Debian Importer Fixing VCID-gfff-zanp-aqb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:08.700917+00:00 Debian Importer Fixing VCID-3g47-n64z-bqbb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:03.907823+00:00 Debian Importer Fixing VCID-j4gm-njhq-6ygk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:59.004202+00:00 Debian Importer Fixing VCID-a1px-egkx-qkgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:46.692968+00:00 Debian Importer Fixing VCID-h776-h6y3-ufcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:46.584330+00:00 Debian Importer Fixing VCID-f4wy-kf5n-5bhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:44.581237+00:00 Debian Importer Fixing VCID-vhv6-2yu5-wbb3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:30.164495+00:00 Debian Importer Fixing VCID-4eva-e818-yfgq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:29.660135+00:00 Debian Importer Fixing VCID-568z-e7ep-dbdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:24.398709+00:00 Debian Importer Fixing VCID-fw2y-5rmc-uyd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:21.310938+00:00 Debian Importer Fixing VCID-mu6w-nub4-z3ef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:16.150820+00:00 Debian Importer Fixing VCID-p5qn-njcb-1fdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:02.421294+00:00 Debian Importer Fixing VCID-s22j-vmt3-6qaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:57.412375+00:00 Debian Importer Fixing VCID-y5mg-rpf8-cbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:56.308698+00:00 Debian Importer Fixing VCID-umkp-zyee-sqac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:55.301027+00:00 Debian Importer Fixing VCID-pmub-shqe-ubbt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:55.185275+00:00 Debian Importer Fixing VCID-afs1-pn6y-2qej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:48.336701+00:00 Debian Importer Fixing VCID-93n4-278h-dydh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.770432+00:00 Debian Importer Fixing VCID-fg72-nbqy-mqgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:38.028237+00:00 Debian Importer Fixing VCID-tpcz-e492-efdk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:30.819772+00:00 Debian Importer Fixing VCID-d3u3-epeb-guh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:26.296612+00:00 Debian Importer Fixing VCID-q9rb-p3vk-5uaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:25.390501+00:00 Debian Importer Fixing VCID-4nbm-18gn-q7bt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:19.731589+00:00 Debian Importer Fixing VCID-beus-rm7h-3qga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:11.473365+00:00 Debian Importer Fixing VCID-y5h1-n12a-ebg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:51.580990+00:00 Debian Importer Fixing VCID-zfuc-jbs7-a7c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:47.454345+00:00 Debian Importer Fixing VCID-ggz7-h35v-p7ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:43.370630+00:00 Debian Importer Fixing VCID-seed-bera-73ez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:39.522716+00:00 Debian Importer Fixing VCID-yuub-nqnn-qyg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:35.533001+00:00 Debian Importer Fixing VCID-5hnm-hz17-2bey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:31.186836+00:00 Debian Importer Fixing VCID-8s2g-2brb-tfhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:29.987769+00:00 Debian Importer Fixing VCID-vzhw-bgs7-sye3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:23.480491+00:00 Debian Importer Fixing VCID-emwr-t3hg-xqdx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:21.641317+00:00 Debian Importer Fixing VCID-3uwh-y2m1-nugc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:20.638743+00:00 Debian Importer Fixing VCID-zbkr-bd4m-77cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:13.208383+00:00 Debian Importer Fixing VCID-auz9-64vf-7qdp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:10.195445+00:00 Debian Importer Fixing VCID-ntvt-zdsj-1fgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:06.239492+00:00 Debian Importer Fixing VCID-eek7-jgkz-akdh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:54.845671+00:00 Debian Importer Fixing VCID-mufb-kvfq-mubz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:54.684218+00:00 Debian Importer Fixing VCID-egd5-p68y-wfdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:50.978643+00:00 Debian Importer Fixing VCID-cexz-mrrc-v3gp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:33.913155+00:00 Debian Importer Fixing VCID-qvz2-bk3f-7bch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:33.226152+00:00 Debian Importer Fixing VCID-xfzw-afgg-fqdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:20.259431+00:00 Debian Importer Fixing VCID-p5hg-2rdb-z3hq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:16.344963+00:00 Debian Importer Fixing VCID-8j4p-qa4k-g3ee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:09.500465+00:00 Debian Importer Fixing VCID-mdfk-5ked-t3bu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:50.976219+00:00 Debian Importer Fixing VCID-hch1-2kkj-qubf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:47.812153+00:00 Debian Importer Fixing VCID-5ye8-ycmx-6qga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:29.313885+00:00 Debian Importer Fixing VCID-89nm-dhhw-rudd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:14.774390+00:00 Debian Importer Fixing VCID-z7du-zx2w-nubk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:03.262438+00:00 Debian Importer Fixing VCID-14ba-3s5a-2ff3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:53.410479+00:00 Debian Importer Fixing VCID-xbuy-fyct-tqcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:46.596761+00:00 Debian Importer Fixing VCID-bcbq-sbmz-ayd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:46.564140+00:00 Debian Importer Fixing VCID-qwwa-mf8k-2fdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:44.488314+00:00 Debian Importer Fixing VCID-new8-u5x9-nkeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:36.997106+00:00 Debian Importer Fixing VCID-p14n-mfwj-vufs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:35.974625+00:00 Debian Importer Fixing VCID-kurn-1uay-qqap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:31.089363+00:00 Debian Importer Fixing VCID-jcfy-dyqj-h3aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:27.935185+00:00 Debian Importer Fixing VCID-b43h-aewb-hqfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:19.792113+00:00 Debian Importer Fixing VCID-ccdb-7g4p-bugy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:13.591792+00:00 Debian Importer Fixing VCID-jn71-tnyw-cqdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:12.245030+00:00 Debian Importer Fixing VCID-tj9r-n16b-7uam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:11.461361+00:00 Debian Importer Fixing VCID-vqyc-hxfb-ufav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:05.122101+00:00 Debian Importer Fixing VCID-pxt8-5rha-kkf8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:03.521034+00:00 Debian Importer Fixing VCID-dfvv-cqbj-mubr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:58.323131+00:00 Debian Importer Fixing VCID-6cre-dvhv-tyfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:57.072896+00:00 Debian Importer Fixing VCID-4zzn-3akx-qyav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:56.923898+00:00 Debian Importer Fixing VCID-2r3h-sgxr-ffdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:55.361366+00:00 Debian Importer Fixing VCID-tzrt-nka9-67hh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:42.136291+00:00 Debian Importer Fixing VCID-w94u-kcpw-4ub2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:40.001901+00:00 Debian Importer Fixing VCID-et1s-49mc-v7ej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:38.999750+00:00 Debian Importer Fixing VCID-k8az-72sh-cuer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:37.684209+00:00 Debian Importer Fixing VCID-t74n-k2kq-z3hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:33.768357+00:00 Debian Importer Fixing VCID-rhj5-gtyt-2ucn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:19.415847+00:00 Debian Importer Fixing VCID-vbmy-urt6-myha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:06.796385+00:00 Debian Importer Fixing VCID-x538-vjsv-3ud8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:06.682031+00:00 Debian Importer Fixing VCID-s3kf-5t6w-c7hm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:03.250438+00:00 Debian Importer Fixing VCID-z2zq-jbdg-zke4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:01.852150+00:00 Debian Importer Fixing VCID-edx7-wgfh-cuaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:01.504983+00:00 Debian Importer Fixing VCID-8vyy-rhvj-9uba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:56.129981+00:00 Debian Importer Fixing VCID-sq4f-krz1-87fw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:52.410717+00:00 Debian Importer Fixing VCID-s15m-qwrh-bqdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:47.419538+00:00 Debian Importer Fixing VCID-f2br-quyp-v3ax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:42.767448+00:00 Debian Importer Fixing VCID-zys1-2pnp-h3an https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:39.678671+00:00 Debian Importer Fixing VCID-7dcd-v8q9-b3bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:35.151232+00:00 Debian Importer Fixing VCID-e3qs-51ap-nkbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:33.189827+00:00 Debian Importer Fixing VCID-tzph-y73s-6qb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:30.299549+00:00 Debian Importer Fixing VCID-fsn5-241x-f7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:29.319027+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:27.400825+00:00 Debian Importer Fixing VCID-f8wt-f14e-s7d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:18.941782+00:00 Debian Importer Fixing VCID-kh69-m841-jbbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:08.214717+00:00 Debian Importer Fixing VCID-ssb2-q4q7-hqhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:05.914924+00:00 Debian Importer Fixing VCID-v7xg-3h2f-1yd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:45.435328+00:00 Debian Importer Fixing VCID-wjvc-p75d-p3a9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:40.861375+00:00 Debian Importer Fixing VCID-sbbh-2bet-gyaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:36.988879+00:00 Debian Importer Fixing VCID-fvmm-4zme-a3at https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:36.540815+00:00 Debian Importer Fixing VCID-4z4r-2w8m-r7dz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:34.835544+00:00 Debian Importer Fixing VCID-p4qp-2b79-akhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:31.997783+00:00 Debian Importer Fixing VCID-uzyz-uw16-7ufk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:31.880410+00:00 Debian Importer Fixing VCID-pwm2-bk7k-j7cm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:31.498348+00:00 Debian Importer Fixing VCID-63vt-1nc8-6kfc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.428074+00:00 Debian Importer Fixing VCID-ku97-h544-fua1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:26.364517+00:00 Debian Importer Fixing VCID-k4w5-5g16-x3b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:25.328880+00:00 Debian Importer Fixing VCID-n51n-m2r7-kbdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:12.415902+00:00 Debian Importer Fixing VCID-y3k7-e14w-xqbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:03.707647+00:00 Debian Importer Fixing VCID-83fz-ctpv-yuew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:48.908238+00:00 Debian Importer Fixing VCID-u4qp-vcnh-c3dd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.058511+00:00 Debian Importer Fixing VCID-8y9g-m17c-kyey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:37.993775+00:00 Debian Importer Fixing VCID-u4q5-6h15-guf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:37.891039+00:00 Debian Importer Fixing VCID-nu3x-4yc8-ufg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:34.993854+00:00 Debian Importer Fixing VCID-zd3n-bhwe-xqej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:28.361022+00:00 Debian Importer Fixing VCID-dn26-zfsc-ryec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:22.063709+00:00 Debian Importer Fixing VCID-gg41-q6x3-bbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:52.692530+00:00 Debian Importer Fixing VCID-pty8-xunq-huf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:51.496949+00:00 Debian Importer Fixing VCID-aagg-bbac-rfez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:51.297528+00:00 Debian Importer Fixing VCID-1346-uavy-pbdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:45.485904+00:00 Debian Importer Fixing VCID-axqc-hqfs-1fg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:25.167714+00:00 Debian Importer Fixing VCID-th8f-btfy-1yg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:20.503060+00:00 Debian Importer Fixing VCID-qacw-bby8-9kdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:14.136690+00:00 Debian Importer Fixing VCID-3v58-x48y-jug2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:12.155991+00:00 Debian Importer Fixing VCID-avvd-1gv9-eyb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:11.189727+00:00 Debian Importer Fixing VCID-azhe-cxb8-3kbb https://security-tracker.debian.org/tracker/data/json 38.1.0