Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/firefox-esr@0?distro=trixie
purl pkg:deb/debian/firefox-esr@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (181)
Vulnerability Summary Aliases
VCID-15mn-5hnv-w7f4 The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.*Note: this issue only affects Firefox on Windows operating systems.* CVE-2020-12389
VCID-19r2-4svk-uydr Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4578
VCID-1dkk-86db-s3ch Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5168
VCID-1rj3-tt63-4yc1 Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. CVE-2021-38497
VCID-1ur2-g3su-pqd3 A Cliqz.com developer demonstrated that web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49. CVE-2016-5288
VCID-1w8j-w2rh-hqdf Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2809
VCID-2a5d-8cac-mkft A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code.*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.* CVE-2023-29542
VCID-2w58-mdmk-guh8 Mozilla has updated the version of Network Security Services (NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated networking security issues reported by Mozilla engineers Tyson Smith and Jed Davis. CVE-2016-2834
VCID-2xtz-k8nq-n3hf A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.* CVE-2020-6828
VCID-2z7p-2uj3-2qfb If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.* CVE-2019-9815
VCID-3465-gq22-3kfy Multiple vulnerabilities have been found in Expat, the worst of which may allow execution of arbitrary code. CVE-2016-0718
VCID-44zf-meps-6fey Given an installed malicious file picker application, an attacker was able to overwrite local files and thus overwrite Firefox settings (but not access the previous profile). *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.* CVE-2020-15650
VCID-47dr-szw4-ryfr During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. CVE-2016-5292
VCID-4c3c-ygt3-kbg5 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2020-6797
VCID-4r8e-64b6-bbbu Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. CVE-2026-4711
VCID-4rpa-nwnh-b3h3 The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through the Mozilla Maintenance Service, allowing the manipulation of files in the installation directory and privilege escalation by manipulating the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-7760
VCID-4sv2-j8zg-xkhf When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2019-17009
VCID-4vps-3cxv-xyd5 On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. CVE-2024-5692
VCID-4z19-eyh7-9yf4 The existence of a specifically requested local file can be found due to the double firing of the onerror when the source attribute on a <track> tag refers to a file that does not exist if the source page is loaded locally. CVE-2017-5387
VCID-5666-pp89-aqc2 The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.*Note: this issue only affects Firefox on Windows operating systems.* CVE-2020-12393
VCID-5aga-y5nk-5fha A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would processing incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* CVE-2021-29964
VCID-5c1p-6gjw-wkgx Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to the execution of arbitrary code. CVE-2018-12391
VCID-5p2x-6brd-xfad Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. *Note: This attack only affects OS X operating systems. Other operating systems are unaffected.* CVE-2017-7763
VCID-5srb-q1nd-1qfh A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.* CVE-2017-7845
VCID-5zmj-5xkc-zkgc A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-11694
VCID-6cde-35h4-vqaj An issue where WebExtensions can use the mozAddonManager API to elevate privilege due to privileged pages being allowed in the permissions list. This allows a malicious extension to then install additional extensions without explicit user permission. CVE-2016-9075
VCID-6p3q-f7f6-mygv Mozilla developers and community members Christian Holler, Jon Coppeard, Milan Sreckovic, Tyson Smith, Ronald Crane, Randell Jesup, Philipp, Tooru Fujisawa, and Kan-Ru Chen reported memory safety bugs present in Firefox 52 and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2017-5430
VCID-6pk2-g77j-h3b2 An integer overflow during the parsing of XML using the Expat library. CVE-2016-9063
VCID-6rpt-16pv-yfar The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.* CVE-2017-7755
VCID-6s88-vfr8-u3hj Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4585
VCID-6uth-8k3d-7qdj Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2018-12381
VCID-6zjy-1agk-nbd9 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5174
VCID-754j-7erb-z7ae Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. CVE-2025-2817
VCID-7939-5qcd-tqgg Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges.*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* CVE-2025-4082
VCID-7fvy-7hpe-kbej Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. CVE-2021-38492
VCID-7sbd-1n7f-ryed Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4057
VCID-7u5b-uzd5-7kdc Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* CVE-2024-11691
VCID-7xh6-s1h4-dbhw CVE-2026-6759
VCID-8bvd-y3qe-8qfk The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. *Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2019-11736
VCID-8cv4-kvfj-4uek Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. CVE-2019-11758
VCID-8hgj-7cb6-fbbp A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.* CVE-2019-9818
VCID-8kgq-qhy6-e3c2 Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. CVE-2022-38476
VCID-8xz8-qent-zkav Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5260
VCID-9dpt-xfu6-cuh5 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4580
VCID-9fsb-vzuc-efc5 A buffer overflow in SkiaGl caused when a GrGLBuffer is truncated during allocation. Later writers will overflow the buffer, resulting in a potentially exploitable crash. CVE-2016-9894
VCID-9fxa-6w88-y3h4 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5268
VCID-9gcq-8grt-vfhc A maliciously crafted page loaded to the sidebar through a bookmark can reference a privileged chrome window and engage in limited JavaScript operations violating cross-origin protections. CVE-2016-9070
VCID-9hep-yqmw-8bg4 When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. *Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected.* CVE-2016-9072
VCID-9tnr-m8mg-3ffw Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* CVE-2025-5265
VCID-9y48-sjn7-rqeu Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2021-38501
VCID-a2as-nfu2-ykax Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-32214
VCID-a68p-hcz6-jffj The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.*Note: this issue only affects Firefox on Windows operating systems.* CVE-2020-12388
VCID-af5n-5ye1-s3fd Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheets CVE-2011-2670
VCID-af6b-4jqc-fugx The mozAddonManager allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites. CVE-2017-5393
VCID-ahzr-nr7g-5ue2 A STUN server in conjunction with a large number of webkitRTCPeerConnection objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. CVE-2017-5388
VCID-akwm-tx92-bqfs Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header CVE-2011-2668
VCID-avgs-nz9j-gqg8 On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. CVE-2025-1930
VCID-ax8a-z9s4-e3dk A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.* CVE-2019-9794
VCID-b28z-4pwb-buc2 When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.* CVE-2020-6827
VCID-b65s-fwk5-gkbs Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2827
VCID-b8qk-zbj4-yfg2 When setting a thread name on Windows in WebRTC, an incorrect number of arguments could have been supplied, leading to stack corruption and a potentially exploitable crash. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-13722
VCID-baq3-sm51-3qae An error in the WindowsDllDetourPatcher where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. *Note: This attack only affects Windows operating systems. Other operating systems are not affected.* CVE-2017-7782
VCID-bb61-y349-fqgx Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5266
VCID-bbsb-t7kv-4bbw Mozilla developers and community members reported several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. CVE-2016-2815
VCID-bd6g-ev4d-kyf6 Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code. CVE-2018-18335
VCID-c52k-tg8d-sbeg Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-23599
VCID-c6jc-3917-x7dx Security researcher Tim McCormack reported that when a page requests a series of permissions in a short timespan, the resulting permission notifications can show the icon for the wrong permission request. This can lead to user confusion and inadvertent consent given when a user is prompted by web content to give permissions, such as for geolocation or microphone access. CVE-2016-2829
VCID-cfqv-7r6b-g3e9 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4576
VCID-cfy8-73k1-jkdj The Mozilla Maintenance Service helper.exe application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junction can be deleted by the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-7761
VCID-cmnc-fyxb-rfd4 An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.*This bug only affects Firefox for macOS. Other operating systems are unaffected.* CVE-2023-29531
VCID-cpra-u2v5-3qg5 An attack using manipulation of updater.ini contents, used by the Mozilla Windows Updater, and privilege escalation through the Mozilla Maintenance Service to allow for arbitrary file execution and deletion by the Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-7766
VCID-cqtb-7t8w-rug2 A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. CVE-2016-5287
VCID-d5hs-m1zz-kybj The destructor function for the WindowsDllDetourPatcher class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. *Note: This attack only affects Windows operating systems. Other operating systems are not affected.* CVE-2017-7804
VCID-d9dm-aww1-pfbm Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5253
VCID-de4g-6sjv-6ugg Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2820
VCID-dv2d-9a59-xkaq Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. CVE-2017-5384
VCID-dveb-sthz-bkgu Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-25738
VCID-dyn7-63ve-37at Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2813
VCID-e2ww-ngam-cugq The "export" function in the Certificate Viewer can force local filesystem navigation when the "common name" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename. CVE-2017-5381
VCID-e7p8-zrwx-5ug6 A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. *This bug only affects the application when running on macOS. Other operating systems are unaffected.* CVE-2024-11698
VCID-ebhp-kzkz-euhu Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. *This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.* CVE-2023-29545
VCID-efvs-1tuf-guf4 Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. CVE-2026-4712
VCID-ewet-6xtr-sqdn Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates. CVE-2011-2669
VCID-f4ja-2ydw-cufu The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2024-11693
VCID-f8c7-p8nz-bbap A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2023-29532
VCID-f8wd-xgwu-8kgm Canvas allows the use of the feDisplacementMap filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations. CVE-2016-9077
VCID-fmub-ph5x-pbdu Redirection from an HTTP connection to a data: URL assigns the referring site's origin to the data: URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. *Note: This issue only affects Firefox 49 and 50.* CVE-2016-9078
VCID-fvp8-grcg-27d3 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2812
VCID-g2et-bnvt-9fem During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-17021
VCID-gbsw-gmc4-uqad Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2811
VCID-gqbc-wbhs-4bbx Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5256
VCID-gqhc-h5p7-dyh1 Mozilla's add-ons SDK had a world-accessible resource with an HTML injection vulnerability. If an additional vulnerability allowed this resource to be loaded as a document it could allow injecting content and script into an add-on's context. CVE-2016-9903
VCID-gu5n-35b2-a3am Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2839
VCID-hhtb-ha1v-tffj A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. CVE-2017-5377
VCID-hhu1-cgcx-nfev During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. CVE-2021-38498
VCID-htpg-t39z-nbex Use-after-free vulnerability in Web Animations when interacting with cycle collection found through fuzzing. CVE-2017-5379
VCID-j2ax-jb2h-byeu Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4052
VCID-j2ga-ggcd-fkg1 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2805
VCID-jvy8-w1m2-ayaw A use-after-free during web animations when working with timelines resulting in a potentially exploitable crash. CVE-2016-9068
VCID-jxq3-3gzd-yycp Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5294
VCID-k1u4-hqjh-zbc8 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5251
VCID-k813-qahc-ubf4 Security researcher Aral reported an out-of-bounds write when using the ANGLE graphics library, which is used for WebGL content on Windows systems. This crash occurs due to improper size checking while writing to an array during some WebGL shader operations. The ANGLE graphics library is only used on Windows. Linux, OS X, and Android operating systems are not affected by this vulnerability. CVE-2016-2824
VCID-kr94-y6hg-d3hp Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2020-6799
VCID-krg2-d4vy-z7fu During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-17015
VCID-m2vr-a1ee-j7gv Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5255
VCID-m5pb-75ag-tfep Use-after-free while manipulating the navigator object within WebVR. *Note: WebVR is not currently enabled by default.* CVE-2016-9896
VCID-m92a-91pv-dffv If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-35112
VCID-mdpv-kcbb-9ubj Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history. CVE-2016-9071
VCID-mp4n-ez8p-63ek Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-28163
VCID-mqte-f1hw-2ya5 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2022-22753
VCID-mtkx-1vvb-3yhp In the Angle graphics library, depth pitch computations did not take into account the block size and simply multiplied the row pitch with the pixel height. This caused the load functions to use a very high depth pitch, reading past the end of the user-supplied buffer.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-16048
VCID-mwrr-ashj-bfg3 Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to the execution of arbitrary code. CVE-2017-7825
VCID-myv9-89b8-w7dm In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the SEE_MASK_FLAG_NO_UI flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won’t prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. *Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems.* CVE-2018-5174
VCID-n8hk-44ah-bugr Due to insufficient escaping of the ampersand character in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* CVE-2025-4084
VCID-ngw4-xb6d-gqfm An integer overflow in createImageBitmap() was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the createImageBitmap API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer. CVE-2017-5428
VCID-p365-j5gq-4uct Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2816
VCID-p595-z1gu-6fgf Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding CVE-2013-5594
VCID-pber-bzw2-r3gw The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-7768
VCID-pn68-e9g7-qbf1 The executable file warning did not warn users before opening files with the terminal extension. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* CVE-2025-6426
VCID-pv9q-fcta-ffbq Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4577
VCID-pybp-xzy7-q3a8 Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. CVE-2016-9067
VCID-q38n-z9wb-qufk Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5283
VCID-q77k-hc9g-9fhm The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service.*Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.* CVE-2021-29951
VCID-qa9c-xyvd-kygu Mozilla developer John Schoenick reported that CSS pseudo-classes can be used by web content to leak information on plugins that are installed but disabled. This can be used for information disclosure through a fingerprinting attack that lists all of the plugins installed by a user on a system, even when they are disabled. CVE-2016-2832
VCID-qjs9-h3tt-qucf Special about: pages used by web content, such as RSS feeds, can load privileged about: pages in an iframe. If a content-injection bug were found in one of those pages this could allow for potential privilege escalation. CVE-2017-5391
VCID-qrbp-3x9q-q3g2 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5273
VCID-qrqw-p9v1-zfb2 Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5282
VCID-qu9b-rst3-v7fa Security researcher Frédéric Hoguin reported a mechanism where the Mozilla Windows updater could be used to overwrite arbitrary files. He found that files extracted by the updater from a MAR archive are not locked for writing and can be overwritten by other processes while the updater is running. A malicious local program could invoke the updater and then interfere with the extracted files, replacing them with its own. This vulnerability could be used for privilege escalation if these overwritten files were later invoked by other Windows components that had higher privileges. This issue does not affect non-Windows operating systems. CVE-2016-2826
VCID-qv7a-3c41-x3cr Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. CVE-2022-38477
VCID-qw5k-tgdz-vkcw The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-5409
VCID-qwc9-da7w-4kdr Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2804
VCID-qzrz-4abn-q7f2 Security researcher Armin Ebert reported that the location.host property can be set to an arbitrary string after creating an invalid data: URI. This allows for a bypass of some same-origin policy protections. This issue is mitigated by the data: URI in use and any same-origin checks for http: or https: are still enforced correctly. As a result cookie stealing and other common same-origin bypass attacks are not possible. CVE-2016-2825
VCID-r34s-64j2-dfff Feed preview for RSS feeds can be used to capture errors and exceptions generated by privileged content, allowing for the exposure of internal information not meant to be seen by web content. CVE-2017-5382
VCID-r7te-y4n3-1uhj Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. CVE-2017-5385
VCID-r8jw-hvmm-pkhs Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2835
VCID-rakk-h5vn-kbaw Given an installed malicious file picker application, an attacker was able to steal and upload local files of their choosing, regardless of the actually files picked. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.* CVE-2020-15649
VCID-rsy6-acfe-ffb5 The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-22744
VCID-rz6b-kepf-cfg9 Mozilla developers and community members Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey, Jesse Ruderman, and Markus Stange reported memory safety bugs present in Firefox 49. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2016-5289
VCID-s3kc-mhdz-nkeh Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-25743
VCID-sjy7-cp3x-nfh2 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2018-12368
VCID-snbc-j4e3-uff1 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4582
VCID-sncs-nk53-jbap Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5279
VCID-sp11-eqxh-t3gw Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2817
VCID-srf6-8n4s-uyb6 The Mozilla Maintenance Service can be invoked by an unprivileged user to overwrite arbitrary files with junk data using the Mozilla Windows Updater, which runs with the Maintenance Service's privileged access. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2017-7767
VCID-t769-2t1u-57b6 Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account.*This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.* CVE-2021-38505
VCID-t8mb-cdc3-6ydq Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS. CVE-2024-6600
VCID-tfny-yt17-mffx Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4054
VCID-tjp3-ck7p-5qg3 An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. CVE-2024-2605
VCID-tnxh-tgsm-tuex A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-22746
VCID-tq43-rx5u-eybv Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4583
VCID-u1nc-fgsw-mkhc Mozilla developers and community members Gary Kwong, Olli Pettay, Tooru Fujisawa, Carsten Book, Andrew McCreight, Chris Pearce, Ronald Crane, Jan de Mooij, Julian Seward, Nicolas Pierron, Randell Jesup, Esther Monchari, Honza Bambas, and Philipp reported memory safety bugs present in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2017-5374
VCID-u5n5-6h82-tqhw Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-25734
VCID-uhct-zkhb-k3ca Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5275
VCID-umhx-zswu-kkbt Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5293
VCID-urpr-qse2-7kcf Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-26966
VCID-uuc6-a3xx-6khk Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.* CVE-2019-9801
VCID-v28j-cvrw-p3c7 WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox. CVE-2016-9073
VCID-v9ua-1tey-cyaa Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2022-46875
VCID-vdvy-zc8w-6kbf Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5271
VCID-vnuz-wp96-pqgt WebExtensions could use the mozAddonManager API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. CVE-2017-5389
VCID-vtjf-sufh-p3h4 crossbeam-deque Data Race before v0.7.4 and v0.8.1 ### Impact In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. ### Patches This has been fixed in crossbeam-deque 0.8.1 and 0.7.4. ### Credits This issue was reported and fixed by Maor Kleinberger. ### License This advisory is in the public domain. CVE-2021-32810
GHSA-pqqp-xmhj-wgcw
VCID-vun4-z8ju-gbbc If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-15663
VCID-vw4n-4r41-ukbp Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5727
VCID-vzg5-b77s-g3ft Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. CVE-2022-34478
VCID-vzkp-7dsz-kbee Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-2810
VCID-vzwe-r2ms-m7bv Mozilla engineer Matt Wobensmith reported that Content Security Policy (CSP) does not block the loading of cross-domain Java applets when specified by policy. This is because the Java applet is loaded by the Java plugin, which then mediates all network requests without checking against CSP. This could allow a malicious site to manipulate content through a Java applet to bypass CSP protections, allowing for possible cross-site scripting (XSS) attacks. CVE-2016-2833
VCID-wffz-7y83-qkbm Mozilla developers and community members Kan-Ru Chen, Christian Holler, and Tyson Smith reported memory safety bugs present in Firefox 50.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2016-9080
VCID-wfkr-weku-fudt Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. *Note: this issue only affects Firefox on Windows operating systems.* CVE-2019-11751
VCID-wfqy-u76t-ybgb Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* CVE-2025-2857
VCID-wzxk-316c-xqcg When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-31739
VCID-xrg1-azru-5qf1 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4051
VCID-xspq-dfwk-27gq Mozilla developer Johann Hofmann reported that unsanitized output in the browser UI can lead to arbitrary code execution. This issue did not affect Firefox for Android or Firefox 52 ESR. CVE-2018-5124
VCID-y7rn-wb1d-vbdg The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.* CVE-2017-7765
VCID-yfmg-82tr-gfec The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.* CVE-2021-38510
VCID-ygrd-4scr-wkau Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4053
VCID-yust-3g8v-muas The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2024-3863
VCID-yy4z-p3f1-qbbc An issue where a <select> dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. CVE-2016-9076
VCID-z86r-71n4-p7aj Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird the worst of which could lead to the execution of arbitrary code. CVE-2016-5267
VCID-zdbt-zhtq-xfhj Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect Firefox running on other operating systems. CVE-2025-11713
VCID-zjn8-79ab-tqd3 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5726
VCID-zycf-ufab-8yfb The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2019-11753

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-23T05:40:26.947173+00:00 Debian Importer Fixing VCID-7xh6-s1h4-dbhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:13:26.634385+00:00 Debian Importer Fixing VCID-rakk-h5vn-kbaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:51:03.958090+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:48.758182+00:00 Debian Importer Fixing VCID-wffz-7y83-qkbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:18.193387+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:28.525371+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:50:36.866700+00:00 Debian Importer Fixing VCID-4rpa-nwnh-b3h3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:38.162621+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:53.170959+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:44.531817+00:00 Debian Importer Fixing VCID-srf6-8n4s-uyb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:40:06.697476+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:38:15.606368+00:00 Debian Importer Fixing VCID-6pk2-g77j-h3b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:36.054175+00:00 Debian Importer Fixing VCID-y7rn-wb1d-vbdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:38.470533+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:27.037863+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:28.422320+00:00 Debian Importer Fixing VCID-a68p-hcz6-jffj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:56.046816+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:34.822420+00:00 Debian Importer Fixing VCID-qu9b-rst3-v7fa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:12.090370+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:25:54.702459+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:01.808778+00:00 Debian Importer Fixing VCID-pybp-xzy7-q3a8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:43.418638+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:33.676058+00:00 Debian Importer Fixing VCID-6rpt-16pv-yfar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:02.452496+00:00 Debian Importer Fixing VCID-qrqw-p9v1-zfb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:11.916736+00:00 Debian Importer Fixing VCID-umhx-zswu-kkbt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:15.191144+00:00 Debian Importer Fixing VCID-cfy8-73k1-jkdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:11.894796+00:00 Debian Importer Fixing VCID-r7te-y4n3-1uhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:25.837356+00:00 Debian Importer Fixing VCID-44zf-meps-6fey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:00.613670+00:00 Debian Importer Fixing VCID-de4g-6sjv-6ugg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:27.095173+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:38.954698+00:00 Debian Importer Fixing VCID-1ur2-g3su-pqd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:46.842188+00:00 Debian Importer Fixing VCID-dyn7-63ve-37at https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:29.090257+00:00 Debian Importer Fixing VCID-htpg-t39z-nbex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:54.426585+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:03.019628+00:00 Debian Importer Fixing VCID-fvp8-grcg-27d3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:37.452622+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:27.170272+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:29.242213+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:47.559315+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:39.518939+00:00 Debian Importer Fixing VCID-qjs9-h3tt-qucf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:17.529474+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:32.161642+00:00 Debian Importer Fixing VCID-qwc9-da7w-4kdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:27.541113+00:00 Debian Importer Fixing VCID-cpra-u2v5-3qg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:22.920435+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:33:20.633295+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:47.027772+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:19.603364+00:00 Debian Importer Fixing VCID-hhtb-ha1v-tffj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:53.234516+00:00 Debian Importer Fixing VCID-bb61-y349-fqgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:03.700987+00:00 Debian Importer Fixing VCID-p595-z1gu-6fgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:55.015367+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:50.687227+00:00 Debian Importer Fixing VCID-gqbc-wbhs-4bbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:44.124178+00:00 Debian Importer Fixing VCID-xspq-dfwk-27gq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:42.921566+00:00 Debian Importer Fixing VCID-z86r-71n4-p7aj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:37.938651+00:00 Debian Importer Fixing VCID-m5pb-75ag-tfep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:24.935900+00:00 Debian Importer Fixing VCID-8bvd-y3qe-8qfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:55.092785+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:27.904031+00:00 Debian Importer Fixing VCID-9fsb-vzuc-efc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:09.539380+00:00 Debian Importer Fixing VCID-d5hs-m1zz-kybj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:42.443142+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:39.643133+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:42.311070+00:00 Debian Importer Fixing VCID-kr94-y6hg-d3hp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:17.734061+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:56.003162+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:23.227720+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:02.496750+00:00 Debian Importer Fixing VCID-af6b-4jqc-fugx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:42.420409+00:00 Debian Importer Fixing VCID-mdpv-kcbb-9ubj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:59.095537+00:00 Debian Importer Fixing VCID-mwrr-ashj-bfg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:33.525017+00:00 Debian Importer Fixing VCID-qw5k-tgdz-vkcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:18.389404+00:00 Debian Importer Fixing VCID-ngw4-xb6d-gqfm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:37.069586+00:00 Debian Importer Fixing VCID-qzrz-4abn-q7f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:46.974721+00:00 Debian Importer Fixing VCID-8xz8-qent-zkav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:22.327902+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:34.970006+00:00 Debian Importer Fixing VCID-ahzr-nr7g-5ue2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:37.248834+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:29.463874+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:40.064152+00:00 Debian Importer Fixing VCID-jxq3-3gzd-yycp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:39.716024+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:39.896814+00:00 Debian Importer Fixing VCID-u1nc-fgsw-mkhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:45.620196+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:16.165815+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:47.361954+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:42.397619+00:00 Debian Importer Fixing VCID-s3kc-mhdz-nkeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:35.976013+00:00 Debian Importer Fixing VCID-uhct-zkhb-k3ca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:35.669328+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:57.321390+00:00 Debian Importer Fixing VCID-q38n-z9wb-qufk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:29.962689+00:00 Debian Importer Fixing VCID-d9dm-aww1-pfbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:53.935208+00:00 Debian Importer Fixing VCID-47dr-szw4-ryfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:27.927789+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:04.754809+00:00 Debian Importer Fixing VCID-rz6b-kepf-cfg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:52.329876+00:00 Debian Importer Fixing VCID-2w58-mdmk-guh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:04.228306+00:00 Debian Importer Fixing VCID-9gcq-8grt-vfhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:21.514062+00:00 Debian Importer Fixing VCID-f8wd-xgwu-8kgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:08.474875+00:00 Debian Importer Fixing VCID-ewet-6xtr-sqdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:32.811974+00:00 Debian Importer Fixing VCID-vzwe-r2ms-m7bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:23.442238+00:00 Debian Importer Fixing VCID-gbsw-gmc4-uqad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:39.808917+00:00 Debian Importer Fixing VCID-k1u4-hqjh-zbc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:40.779223+00:00 Debian Importer Fixing VCID-6uth-8k3d-7qdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:15.959885+00:00 Debian Importer Fixing VCID-jvy8-w1m2-ayaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:11.269714+00:00 Debian Importer Fixing VCID-1w8j-w2rh-hqdf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:49.971249+00:00 Debian Importer Fixing VCID-gqhc-h5p7-dyh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:28.860556+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:20.584360+00:00 Debian Importer Fixing VCID-6cde-35h4-vqaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:37.262412+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:30.898198+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:26.208890+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:29.988806+00:00 Debian Importer Fixing VCID-r8jw-hvmm-pkhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:15.612048+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:11.706666+00:00 Debian Importer Fixing VCID-vnuz-wp96-pqgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:49.214972+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:36.859754+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:32.474848+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:26.238313+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:53.577609+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:18.296331+00:00 Debian Importer Fixing VCID-sp11-eqxh-t3gw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:17.987333+00:00 Debian Importer Fixing VCID-j2ga-ggcd-fkg1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:11.062381+00:00 Debian Importer Fixing VCID-9hep-yqmw-8bg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:40.238220+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:16.299362+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:12.574118+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:19.439568+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:08.897365+00:00 Debian Importer Fixing VCID-gu5n-35b2-a3am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:42.643352+00:00 Debian Importer Fixing VCID-3465-gq22-3kfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:30.172701+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:10.892652+00:00 Debian Importer Fixing VCID-v28j-cvrw-p3c7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:01.100473+00:00 Debian Importer Fixing VCID-yy4z-p3f1-qbbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:55.971195+00:00 Debian Importer Fixing VCID-vzkp-7dsz-kbee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:47.758639+00:00 Debian Importer Fixing VCID-4z19-eyh7-9yf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:43.330453+00:00 Debian Importer Fixing VCID-sncs-nk53-jbap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:31.779778+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:13.063572+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:56.074641+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:37.304497+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:54.163136+00:00 Debian Importer Fixing VCID-r34s-64j2-dfff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:53.032405+00:00 Debian Importer Fixing VCID-e2ww-ngam-cugq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:29.598651+00:00 Debian Importer Fixing VCID-fmub-ph5x-pbdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:10.813198+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:57.849666+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:55.486696+00:00 Debian Importer Fixing VCID-b28z-4pwb-buc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:03.954958+00:00 Debian Importer Fixing VCID-qa9c-xyvd-kygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:11.483787+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:36.452834+00:00 Debian Importer Fixing VCID-af5n-5ye1-s3fd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:01.503585+00:00 Debian Importer Fixing VCID-qrbp-3x9q-q3g2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:31.942451+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:54:26.604127+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:29.673658+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:33.131907+00:00 Debian Importer Fixing VCID-p365-j5gq-4uct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:30.494783+00:00 Debian Importer Fixing VCID-pber-bzw2-r3gw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:25.694315+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:20.452523+00:00 Debian Importer Fixing VCID-zycf-ufab-8yfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:01.586125+00:00 Debian Importer Fixing VCID-9fxa-6w88-y3h4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:59.686605+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:59.511635+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:32.932897+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:07.369017+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:40.848538+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:16.064383+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:51.553662+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:01.423251+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:57.376344+00:00 Debian Importer Fixing VCID-2xtz-k8nq-n3hf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:53.215011+00:00 Debian Importer Fixing VCID-cqtb-7t8w-rug2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:17.175734+00:00 Debian Importer Fixing VCID-c6jc-3917-x7dx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:26.109275+00:00 Debian Importer Fixing VCID-vdvy-zc8w-6kbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:20.786802+00:00 Debian Importer Fixing VCID-akwm-tx92-bqfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:38.777905+00:00 Debian Importer Fixing VCID-baq3-sm51-3qae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:13.788864+00:00 Debian Importer Fixing VCID-dv2d-9a59-xkaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:57.913899+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:28.123211+00:00 Debian Importer Fixing VCID-6p3q-f7f6-mygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:28.073615+00:00 Debian Importer Fixing VCID-b65s-fwk5-gkbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:14.419154+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:56.442995+00:00 Debian Importer Fixing VCID-bbsb-t7kv-4bbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:41.314493+00:00 Debian Importer Fixing VCID-5p2x-6brd-xfad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:11.370893+00:00 Debian Importer Fixing VCID-m2vr-a1ee-j7gv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:45.436875+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:29.345012+00:00 Debian Importer Fixing VCID-15mn-5hnv-w7f4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:21.257061+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:02.370453+00:00 Debian Importer Fixing VCID-wfkr-weku-fudt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:19.325034+00:00 Debian Importer Fixing VCID-k813-qahc-ubf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:41.759487+00:00 Debian Importer Fixing VCID-mtkx-1vvb-3yhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:35.161657+00:00 Debian Importer Fixing VCID-wfqy-u76t-ybgb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:56.081691+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:27.540809+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:06:11.876171+00:00 Debian Importer Fixing VCID-rakk-h5vn-kbaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:52.516630+00:00 Debian Importer Fixing VCID-uhct-zkhb-k3ca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:00:49.082738+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:12.257722+00:00 Debian Importer Fixing VCID-pybp-xzy7-q3a8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:56:21.403145+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:11.590909+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:19.806842+00:00 Debian Importer Fixing VCID-wffz-7y83-qkbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:15.583456+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:08.175109+00:00 Debian Importer Fixing VCID-ahzr-nr7g-5ue2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:41.690902+00:00 Debian Importer Fixing VCID-bb61-y349-fqgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:00.539348+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:29.893665+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:30.954388+00:00 Debian Importer Fixing VCID-qjs9-h3tt-qucf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:08.474818+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:46.193508+00:00 Debian Importer Fixing VCID-f8wd-xgwu-8kgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:18.040530+00:00 Debian Importer Fixing VCID-47dr-szw4-ryfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:30.470014+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:37.136984+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:57.046914+00:00 Debian Importer Fixing VCID-srf6-8n4s-uyb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:41.894796+00:00 Debian Importer Fixing VCID-xspq-dfwk-27gq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:25.057529+00:00 Debian Importer Fixing VCID-qw5k-tgdz-vkcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:54.510857+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:56.732900+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:16.271891+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:50.613609+00:00 Debian Importer Fixing VCID-qzrz-4abn-q7f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:52.172727+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:06.110033+00:00 Debian Importer Fixing VCID-j2ga-ggcd-fkg1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:00.795805+00:00 Debian Importer Fixing VCID-4rpa-nwnh-b3h3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:15.142595+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:11.644294+00:00 Debian Importer Fixing VCID-r7te-y4n3-1uhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:05.087130+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:57.036186+00:00 Debian Importer Fixing VCID-8bvd-y3qe-8qfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:09.782693+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:00.835791+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:49.905411+00:00 Debian Importer Fixing VCID-6pk2-g77j-h3b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:27.009388+00:00 Debian Importer Fixing VCID-y7rn-wb1d-vbdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:43.236919+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:34.954695+00:00 Debian Importer Fixing VCID-de4g-6sjv-6ugg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:26.817719+00:00 Debian Importer Fixing VCID-a68p-hcz6-jffj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:53.700657+00:00 Debian Importer Fixing VCID-akwm-tx92-bqfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:13.349530+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:46.178811+00:00 Debian Importer Fixing VCID-qu9b-rst3-v7fa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:29.840724+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:45.078502+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:41.815576+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:05.114717+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:50.283276+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:20.184396+00:00 Debian Importer Fixing VCID-af6b-4jqc-fugx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:04.874879+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:43.517169+00:00 Debian Importer Fixing VCID-6rpt-16pv-yfar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:08.450217+00:00 Debian Importer Fixing VCID-qrqw-p9v1-zfb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:42.727867+00:00 Debian Importer Fixing VCID-umhx-zswu-kkbt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:04.208817+00:00 Debian Importer Fixing VCID-cfy8-73k1-jkdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:16.201943+00:00 Debian Importer Fixing VCID-44zf-meps-6fey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:12.690447+00:00 Debian Importer Fixing VCID-gqbc-wbhs-4bbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:31:45.585195+00:00 Debian Importer Fixing VCID-9gcq-8grt-vfhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:53.512717+00:00 Debian Importer Fixing VCID-1ur2-g3su-pqd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:15.458177+00:00 Debian Importer Fixing VCID-dyn7-63ve-37at https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:12.282357+00:00 Debian Importer Fixing VCID-vnuz-wp96-pqgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:43.365448+00:00 Debian Importer Fixing VCID-htpg-t39z-nbex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:17.468329+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:02.980548+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:47.463337+00:00 Debian Importer Fixing VCID-fvp8-grcg-27d3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:19.543525+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:50.434318+00:00 Debian Importer Fixing VCID-p365-j5gq-4uct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:44.582693+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:50.901049+00:00 Debian Importer Fixing VCID-hhtb-ha1v-tffj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:36.154321+00:00 Debian Importer Fixing VCID-qwc9-da7w-4kdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:54.786303+00:00 Debian Importer Fixing VCID-cpra-u2v5-3qg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:02.977924+00:00 Debian Importer Fixing VCID-yy4z-p3f1-qbbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:55.605349+00:00 Debian Importer Fixing VCID-z86r-71n4-p7aj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:30.570769+00:00 Debian Importer Fixing VCID-qrbp-3x9q-q3g2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:41.358503+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:11.915090+00:00 Debian Importer Fixing VCID-mdpv-kcbb-9ubj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:23.558697+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:01.445003+00:00 Debian Importer Fixing VCID-p595-z1gu-6fgf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:13.580469+00:00 Debian Importer Fixing VCID-m5pb-75ag-tfep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:32.206391+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:07.998807+00:00 Debian Importer Fixing VCID-9fsb-vzuc-efc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:32.968477+00:00 Debian Importer Fixing VCID-d5hs-m1zz-kybj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:11.928357+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:26.156435+00:00 Debian Importer Fixing VCID-mwrr-ashj-bfg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:40.370529+00:00 Debian Importer Fixing VCID-kr94-y6hg-d3hp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:32.716817+00:00 Debian Importer Fixing VCID-v28j-cvrw-p3c7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:11.076320+00:00 Debian Importer Fixing VCID-ewet-6xtr-sqdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:47.868087+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:40.102666+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:39.799927+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:15.283080+00:00 Debian Importer Fixing VCID-ngw4-xb6d-gqfm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:20.665340+00:00 Debian Importer Fixing VCID-8xz8-qent-zkav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:55.896402+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:19.053215+00:00 Debian Importer Fixing VCID-jxq3-3gzd-yycp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:18.749573+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:38.144103+00:00 Debian Importer Fixing VCID-gu5n-35b2-a3am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:35.610289+00:00 Debian Importer Fixing VCID-u1nc-fgsw-mkhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:09.520110+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:55.488299+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:44.731711+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:25.363772+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:21.948402+00:00 Debian Importer Fixing VCID-s3kc-mhdz-nkeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:44.673411+00:00 Debian Importer Fixing VCID-d9dm-aww1-pfbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:54.207035+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:47:59.757188+00:00 Debian Importer Fixing VCID-q38n-z9wb-qufk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:33.053245+00:00 Debian Importer Fixing VCID-bbsb-t7kv-4bbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:58.806587+00:00 Debian Importer Fixing VCID-rz6b-kepf-cfg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:52.192749+00:00 Debian Importer Fixing VCID-2w58-mdmk-guh8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:16.533381+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:03.653048+00:00 Debian Importer Fixing VCID-sp11-eqxh-t3gw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:51.635912+00:00 Debian Importer Fixing VCID-vzwe-r2ms-m7bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:14.576434+00:00 Debian Importer Fixing VCID-gbsw-gmc4-uqad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:49.911650+00:00 Debian Importer Fixing VCID-k1u4-hqjh-zbc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:38.573519+00:00 Debian Importer Fixing VCID-6uth-8k3d-7qdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:22.615617+00:00 Debian Importer Fixing VCID-jvy8-w1m2-ayaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:19.035387+00:00 Debian Importer Fixing VCID-1w8j-w2rh-hqdf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:02.607985+00:00 Debian Importer Fixing VCID-gqhc-h5p7-dyh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:04.699636+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:00.235629+00:00 Debian Importer Fixing VCID-6cde-35h4-vqaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:35.987015+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:01.990819+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:21.892975+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:47.224493+00:00 Debian Importer Fixing VCID-r8jw-hvmm-pkhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:36.801316+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:13.463786+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:06.053790+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:03.637764+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:03.978198+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:45.405902+00:00 Debian Importer Fixing VCID-9hep-yqmw-8bg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:11.925420+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:58.849316+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:18.163749+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:53.382774+00:00 Debian Importer Fixing VCID-3465-gq22-3kfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:06.856544+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:45.480208+00:00 Debian Importer Fixing VCID-vzkp-7dsz-kbee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:40.263204+00:00 Debian Importer Fixing VCID-4z19-eyh7-9yf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:37.637316+00:00 Debian Importer Fixing VCID-sncs-nk53-jbap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:31.489439+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:46.068060+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:34.922994+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:23.790703+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:57.884943+00:00 Debian Importer Fixing VCID-r34s-64j2-dfff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:56.761898+00:00 Debian Importer Fixing VCID-e2ww-ngam-cugq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:43.790005+00:00 Debian Importer Fixing VCID-fmub-ph5x-pbdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:41.751440+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:40.605013+00:00 Debian Importer Fixing VCID-b28z-4pwb-buc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:07.936741+00:00 Debian Importer Fixing VCID-qa9c-xyvd-kygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:36.650113+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:15.230743+00:00 Debian Importer Fixing VCID-af5n-5ye1-s3fd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:55.051383+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:39.886296+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:00.928204+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:29.002317+00:00 Debian Importer Fixing VCID-pber-bzw2-r3gw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:01.670570+00:00 Debian Importer Fixing VCID-dv2d-9a59-xkaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:55.061183+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:52.137821+00:00 Debian Importer Fixing VCID-zycf-ufab-8yfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:07.251465+00:00 Debian Importer Fixing VCID-9fxa-6w88-y3h4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:05.505251+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:46.809790+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:50.180518+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:31.792505+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:11.145705+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:21.652876+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:19.203131+00:00 Debian Importer Fixing VCID-2xtz-k8nq-n3hf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:16.483238+00:00 Debian Importer Fixing VCID-cqtb-7t8w-rug2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:55.870554+00:00 Debian Importer Fixing VCID-c6jc-3917-x7dx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:18.447889+00:00 Debian Importer Fixing VCID-vdvy-zc8w-6kbf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:50.444534+00:00 Debian Importer Fixing VCID-baq3-sm51-3qae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:23.418337+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:06.490334+00:00 Debian Importer Fixing VCID-6p3q-f7f6-mygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:06.445936+00:00 Debian Importer Fixing VCID-b65s-fwk5-gkbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:57.262589+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:36.864163+00:00 Debian Importer Fixing VCID-5p2x-6brd-xfad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:18.620830+00:00 Debian Importer Fixing VCID-m2vr-a1ee-j7gv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:02.857850+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:51.404701+00:00 Debian Importer Fixing VCID-15mn-5hnv-w7f4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:45.349034+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:34.272215+00:00 Debian Importer Fixing VCID-wfkr-weku-fudt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:06.622931+00:00 Debian Importer Fixing VCID-k813-qahc-ubf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:45.744945+00:00 Debian Importer Fixing VCID-mtkx-1vvb-3yhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:40.993119+00:00 Debian Importer Fixing VCID-wfqy-u76t-ybgb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:02.534199+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:23:53.701525+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:53.656077+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:48.182991+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:47.658644+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:47.195355+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:47.089678+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:46.865512+00:00 Debian Importer Fixing VCID-wfqy-u76t-ybgb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:46.821487+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:46.300053+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:44.803860+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:41.807439+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:41.535305+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:40.846880+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:39.927300+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:39.296123+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:39.017191+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:38.911833+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:36.473616+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:36.429201+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:36.036691+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.875575+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.766144+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.659011+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.615544+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.509168+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.458884+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.406567+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.362659+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:35.137011+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:34.980614+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:34.930198+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:34.886580+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:34.835875+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:33.985990+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:33.528764+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:33.485055+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:33.185591+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:33.140188+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:32.997006+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:32.698601+00:00 Debian Importer Fixing VCID-s3kc-mhdz-nkeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:32.555198+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:32.410700+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:31.951110+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:31.444029+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:30.034898+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:29.985468+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:29.570397+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:29.069866+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:27.574494+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:27.379755+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:27.287525+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.936216+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.696923+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.553701+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.459645+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.415817+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.270176+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:25.227344+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:24.710978+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:24.625762+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:23.685736+00:00 Debian Importer Fixing VCID-2xtz-k8nq-n3hf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:23.642388+00:00 Debian Importer Fixing VCID-b28z-4pwb-buc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:23.082120+00:00 Debian Importer Fixing VCID-kr94-y6hg-d3hp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:22.997599+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:22.786363+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:22.443409+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:22.023372+00:00 Debian Importer Fixing VCID-mtkx-1vvb-3yhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:21.503422+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:21.373138+00:00 Debian Importer Fixing VCID-44zf-meps-6fey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:21.329955+00:00 Debian Importer Fixing VCID-rakk-h5vn-kbaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.863537+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.779202+00:00 Debian Importer Fixing VCID-15mn-5hnv-w7f4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.737339+00:00 Debian Importer Fixing VCID-a68p-hcz6-jffj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.566373+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.434957+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.221522+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:20.014795+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:19.464779+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:19.334058+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:19.164725+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:18.995738+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:18.644262+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:18.560509+00:00 Debian Importer Fixing VCID-zycf-ufab-8yfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:18.472308+00:00 Debian Importer Fixing VCID-wfkr-weku-fudt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:18.011863+00:00 Debian Importer Fixing VCID-8bvd-y3qe-8qfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:17.422374+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:17.080850+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:16.274829+00:00 Debian Importer Fixing VCID-xspq-dfwk-27gq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:23:15.309864+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:46.200578+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:36.102403+00:00 Debian Importer Fixing VCID-gqbc-wbhs-4bbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:34.820847+00:00 Debian Importer Fixing VCID-hhtb-ha1v-tffj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:32.472181+00:00 Debian Importer Fixing VCID-srf6-8n4s-uyb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:31.268079+00:00 Debian Importer Fixing VCID-47dr-szw4-ryfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:28.869212+00:00 Debian Importer Fixing VCID-ahzr-nr7g-5ue2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:08.563720+00:00 Debian Importer Fixing VCID-m2vr-a1ee-j7gv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:05.026543+00:00 Debian Importer Fixing VCID-af6b-4jqc-fugx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:55.305979+00:00 Debian Importer Fixing VCID-bb61-y349-fqgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:50.242721+00:00 Debian Importer Fixing VCID-4rpa-nwnh-b3h3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:41.539494+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:41.423645+00:00 Debian Importer Fixing VCID-baq3-sm51-3qae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:32.403025+00:00 Debian Importer Fixing VCID-uhct-zkhb-k3ca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:30.868634+00:00 Debian Importer Fixing VCID-qw5k-tgdz-vkcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:14.567760+00:00 Debian Importer Fixing VCID-akwm-tx92-bqfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:09.143089+00:00 Debian Importer Fixing VCID-pybp-xzy7-q3a8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:44.312534+00:00 Debian Importer Fixing VCID-wffz-7y83-qkbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:42.674034+00:00 Debian Importer Fixing VCID-qu9b-rst3-v7fa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:40.607717+00:00 Debian Importer Fixing VCID-r7te-y4n3-1uhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:19.969906+00:00 Debian Importer Fixing VCID-d5hs-m1zz-kybj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:00.858045+00:00 Debian Importer Fixing VCID-vzwe-r2ms-m7bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:00.316679+00:00 Debian Importer Fixing VCID-9fsb-vzuc-efc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:32.824377+00:00 Debian Importer Fixing VCID-sp11-eqxh-t3gw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:31.686676+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:19.027426+00:00 Debian Importer Fixing VCID-qjs9-h3tt-qucf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:13.101802+00:00 Debian Importer Fixing VCID-f8wd-xgwu-8kgm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:57.802744+00:00 Debian Importer Fixing VCID-6pk2-g77j-h3b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:47.392636+00:00 Debian Importer Fixing VCID-q38n-z9wb-qufk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:45.830557+00:00 Debian Importer Fixing VCID-fvp8-grcg-27d3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:38.354860+00:00 Debian Importer Fixing VCID-9gcq-8grt-vfhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:38.199590+00:00 Debian Importer Fixing VCID-9fxa-6w88-y3h4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:50.373831+00:00 Debian Importer Fixing VCID-j2ga-ggcd-fkg1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:27.914174+00:00 Debian Importer Fixing VCID-pber-bzw2-r3gw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:26.813647+00:00 Debian Importer Fixing VCID-vnuz-wp96-pqgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:20.208658+00:00 Debian Importer Fixing VCID-qzrz-4abn-q7f2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:10.372166+00:00 Debian Importer Fixing VCID-cfy8-73k1-jkdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:11.369185+00:00 Debian Importer Fixing VCID-y7rn-wb1d-vbdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:06.029546+00:00 Debian Importer Fixing VCID-qwc9-da7w-4kdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:03.007511+00:00 Debian Importer Fixing VCID-de4g-6sjv-6ugg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:50.031279+00:00 Debian Importer Fixing VCID-yy4z-p3f1-qbbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:40.526796+00:00 Debian Importer Fixing VCID-qrbp-3x9q-q3g2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:15.198701+00:00 Debian Importer Fixing VCID-3465-gq22-3kfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:50.626151+00:00 Debian Importer Fixing VCID-6rpt-16pv-yfar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:44.237411+00:00 Debian Importer Fixing VCID-jxq3-3gzd-yycp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:41.386379+00:00 Debian Importer Fixing VCID-qrqw-p9v1-zfb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:33.987520+00:00 Debian Importer Fixing VCID-umhx-zswu-kkbt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:28.934282+00:00 Debian Importer Fixing VCID-ewet-6xtr-sqdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:21.867411+00:00 Debian Importer Fixing VCID-r8jw-hvmm-pkhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:11.514637+00:00 Debian Importer Fixing VCID-1ur2-g3su-pqd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:09.967078+00:00 Debian Importer Fixing VCID-dyn7-63ve-37at https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:02.240415+00:00 Debian Importer Fixing VCID-htpg-t39z-nbex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:44.846341+00:00 Debian Importer Fixing VCID-ngw4-xb6d-gqfm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:43.737214+00:00 Debian Importer Fixing VCID-p365-j5gq-4uct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:05.453633+00:00 Debian Importer Fixing VCID-cpra-u2v5-3qg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:53.727728+00:00 Debian Importer Fixing VCID-z86r-71n4-p7aj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:26.089119+00:00 Debian Importer Fixing VCID-mdpv-kcbb-9ubj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:25.868396+00:00 Debian Importer Fixing VCID-gbsw-gmc4-uqad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:13.277865+00:00 Debian Importer Fixing VCID-p595-z1gu-6fgf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:02.154503+00:00 Debian Importer Fixing VCID-m5pb-75ag-tfep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:41.907509+00:00 Debian Importer Fixing VCID-mwrr-ashj-bfg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:28.677486+00:00 Debian Importer Fixing VCID-v28j-cvrw-p3c7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:49.574449+00:00 Debian Importer Fixing VCID-8xz8-qent-zkav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:38.540014+00:00 Debian Importer Fixing VCID-u1nc-fgsw-mkhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:23.060653+00:00 Debian Importer Fixing VCID-gu5n-35b2-a3am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:53.250231+00:00 Debian Importer Fixing VCID-d9dm-aww1-pfbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:44.556129+00:00 Debian Importer Fixing VCID-bbsb-t7kv-4bbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:39.587958+00:00 Debian Importer Fixing VCID-9hep-yqmw-8bg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:32.100167+00:00 Debian Importer Fixing VCID-rz6b-kepf-cfg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:31.976456+00:00 Debian Importer Fixing VCID-2w58-mdmk-guh8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:16.754391+00:00 Debian Importer Fixing VCID-k1u4-hqjh-zbc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:07.874072+00:00 Debian Importer Fixing VCID-6uth-8k3d-7qdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:06.010219+00:00 Debian Importer Fixing VCID-jvy8-w1m2-ayaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:05.215938+00:00 Debian Importer Fixing VCID-1w8j-w2rh-hqdf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:02.798725+00:00 Debian Importer Fixing VCID-gqhc-h5p7-dyh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:57.116397+00:00 Debian Importer Fixing VCID-6cde-35h4-vqaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:55.709302+00:00 Debian Importer Fixing VCID-b65s-fwk5-gkbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:48.215781+00:00 Debian Importer Fixing VCID-vzkp-7dsz-kbee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:48.041149+00:00 Debian Importer Fixing VCID-4z19-eyh7-9yf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:47.942856+00:00 Debian Importer Fixing VCID-sncs-nk53-jbap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.613399+00:00 Debian Importer Fixing VCID-r34s-64j2-dfff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.584449+00:00 Debian Importer Fixing VCID-e2ww-ngam-cugq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.158169+00:00 Debian Importer Fixing VCID-fmub-ph5x-pbdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:31.136217+00:00 Debian Importer Fixing VCID-qa9c-xyvd-kygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:25.815603+00:00 Debian Importer Fixing VCID-af5n-5ye1-s3fd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:56.727477+00:00 Debian Importer Fixing VCID-dv2d-9a59-xkaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:37.810753+00:00 Debian Importer Fixing VCID-cqtb-7t8w-rug2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:36.660993+00:00 Debian Importer Fixing VCID-c6jc-3917-x7dx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:34.115275+00:00 Debian Importer Fixing VCID-vdvy-zc8w-6kbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:26.050114+00:00 Debian Importer Fixing VCID-6p3q-f7f6-mygv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:21.076964+00:00 Debian Importer Fixing VCID-5p2x-6brd-xfad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:15.683615+00:00 Debian Importer Fixing VCID-k813-qahc-ubf4 https://security-tracker.debian.org/tracker/data/json 38.1.0