Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
purl pkg:deb/debian/libspring-java@4.3.30-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (32)
Vulnerability Summary Aliases
VCID-2nff-p7we-tuax Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. CVE-2015-3192
GHSA-6v7w-535j-rq5m
VCID-3rev-eg6f-tkb7 Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework. CVE-2018-1275
GHSA-3rmv-2pg5-xvqj
VCID-4sj2-j914-9yfb Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. CVE-2018-1270
GHSA-p5hg-3xm3-gcjg
VCID-53gt-nbgk-hyc2 Directory traversal vulnerability in Pivotal Spring Framework 3.x before 3.2.9 and 4.0 before 4.0.5 allows remote attackers to read arbitrary files via a crafted URL. CVE-2014-3578
GHSA-rhcg-rwhx-qj3j
VCID-6zda-pv5y-uybt The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors. CVE-2015-0201
GHSA-45vg-2v73-vm62
VCID-85tn-8nj1-xyak Spring Framework vulnerable to denial of service In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * io.micrometer:micrometer-core is on the classpath * an ObservationRegistry is configured in the application to record observations Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions. CVE-2023-34053
GHSA-v94h-hvhg-mf9h
VCID-9v66-xp9z-8kea Directory traversal vulnerability in Pivotal Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling. CVE-2014-3625
GHSA-hhm4-hwq6-3c6w
VCID-ajex-5x84-8ygb Cross-site scripting (XSS) vulnerability in web/servlet/tags/form/FormTag.java in Spring MVC in Spring Framework 3.0.0 before 3.2.8 and 4.0.0 before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the requested URI in a default action. CVE-2014-1904
GHSA-ff7p-jqjm-v66h
VCID-asmf-3c71-gqcb The JavaScriptUtils.javaScriptEscape method in web/util/JavaScriptUtils.java in Spring MVC in Spring Framework before 3.2.2 does not properly escape certain characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a (1) line separator or (2) paragraph separator Unicode character or (3) left or (4) right angle bracket. CVE-2013-6430
GHSA-xjrf-8x4f-43h4
VCID-bpme-zq57-4uh7 Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. CVE-2018-1257
GHSA-rcpf-vj53-7h2m
VCID-cpsj-4k25-wufe Improper Privilege Management in Spring Framework In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data. CVE-2021-22118
GHSA-gfwj-fwqj-fp3v
VCID-dfs4-emmn-f3eb Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences. CVE-2016-5007
GHSA-8crv-49fr-2h6j
VCID-e7xv-sdvz-g7e4 The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. CVE-2013-4152
GHSA-rp4p-g69r-438x
VCID-ec6g-dnjb-vycb Under some situations, the Spring Framework 4.2.0 to 4.2.1, 4.0.0 to 4.1.7, 3.2.0 to 3.2.14 and older unsupported versions is vulnerable to a Reflected File Download (RFD) attack. The attack involves a malicious user crafting a URL with a batch script extension that results in the response being downloaded rather than rendered and also includes some input reflected in the response. CVE-2015-5211
GHSA-pgf9-h69p-pcgf
VCID-eer8-apxc-2ue6 The Spring MVC in Spring Framework before 3.2.4 and 4.0.0.M1 through 4.0.0.M2 does not disable external entity resolution for the StAX XMLInputFactory, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML with JAXB, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152. NOTE: this issue was SPLIT from CVE-2013-4152 due to different affected versions. CVE-2013-7315
GHSA-vp63-rrcm-9mph
VCID-fv26-nhx4-dqd3 Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack. CVE-2018-1271
GHSA-g8hw-794c-4j9g
VCID-j3wr-npbv-8qcw An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. CVE-2016-9878
GHSA-2m8h-fgr8-2q9w
VCID-kpma-e8rd-b7c8 Pivotal Spring Framework contains unsafe Java deserialization methods Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. Maintainers recommend investigating alternative components or a potential mitigating control. Version 4.2.6 and 3.2.17 contain [enhanced documentation](https://github.com/spring-projects/spring-framework/commit/5cbe90b2cd91b866a5a9586e460f311860e11cfa) advising users to take precautions against unsafe Java deserialization, version 5.3.0 [deprecate the impacted classes](https://github.com/spring-projects/spring-framework/issues/25379) and version 6.0.0 [removed it entirely](https://github.com/spring-projects/spring-framework/issues/27422). CVE-2016-1000027
GHSA-4wrc-f8pq-fpqp
VCID-kqpg-9cqw-nuen The ActiveDirectoryLdapAuthenticator in Spring Security 3.2.0 to 3.2.1 and 3.1.0 to 3.1.5 does not check the password length. If the directory allows anonymous binds then it may incorrectly authenticate a user who supplies an empty password. CVE-2014-0097
GHSA-gv9v-c375-hvmg
VCID-mqnn-spsw-8fg5 Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. CVE-2018-11040
GHSA-f26x-pr96-vw86
VCID-mvx7-2y3s-fbbb The SourceHttpMessageConverter in Spring MVC in Spring Framework before 3.2.5 and 4.0.0.M1 through 4.0.0.RC1 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue, and a different vulnerability than CVE-2013-4152 and CVE-2013-7315. CVE-2013-6429
GHSA-g6hf-f9cq-q7w7
VCID-pb7f-yasx-17ag Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles. CVE-2018-1272
GHSA-4487-x383-qpph
VCID-pht6-8af8-b3f2 Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable. CVE-2018-15756
GHSA-ffvq-7w96-97p7
VCID-q4ad-g67b-efaj Spring Framework vulnerable to a reflected file download (RFD) ### Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: - The header is prepared with `org.springframework.http.ContentDisposition`. - The filename is set via `ContentDisposition.Builder#filename(String, Charset)`. - The value for the filename is derived from user-supplied input. - The application does not sanitize the user-supplied input. - The downloaded content of the response is injected with malicious commands by the attacker (see RFD paper reference for details). An application is not vulnerable if any of the following is true: - The application does not set a “Content-Disposition” response header. - The header is not prepared with `org.springframework.http.ContentDisposition`. - The filename is set via one of: - `ContentDisposition.Builder#filename(String)`, or - `ContentDisposition.Builder#filename(String, ASCII)` - The filename is not derived from user-supplied input. - The filename is derived from user-supplied input but sanitized by the application. - The attacker cannot inject malicious content in the downloaded content of the response. ### Affected Spring Products and VersionsSpring Framework - 6.2.0 - 6.2.7 - 6.1.0 - 6.1.20 - 6.0.5 - 6.0.28 - Older, unsupported versions are not affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. | Affected version(s) | Fix version | Availability | | - | - | - | | 6.2.x | 6.2.8 | OSS | | 6.1.x | 6.1.21 | OSS | | 6.0.x | 6.0.29 | [Commercial](https://enterprise.spring.io/) | No further mitigation steps are necessary. CVE-2025-41234
GHSA-6r3c-xf4w-jxjm
VCID-qpxj-fzta-v7bs Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed. CVE-2018-1199
GHSA-v596-fwhq-8x48
VCID-r384-aque-vqcw When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack. CVE-2014-0225
GHSA-f93f-g33r-8pcp
VCID-s7s7-tzq3-m3bc Spring Framework server Web DoS Vulnerability In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions. CVE-2024-22233
GHSA-r4q3-7g4q-x89m
VCID-tu1q-zbk1-hbdm Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. CVE-2018-11039
GHSA-9gcm-f4x3-8jpw
VCID-u7kk-c6fm-judy RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input. CVE-2020-5398
GHSA-8wx2-9q48-vm9r
VCID-vac6-v6g7-a7e3 CSRF attack via CORS preflight requests with Spring MVC or Spring WebFlux Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requests should not include credentials and therefore requests should fail authentication. However a notable exception to this are Chrome based browsers when using client certificates for authentication since Chrome sends TLS client certificates in CORS preflight requests in violation of spec requirements. No HTTP body can be sent or received as a result of this attack. CVE-2020-5397
GHSA-7pm4-g2qj-j85x
VCID-vkf8-5z5m-wqc7 The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4152, CVE-2013-7315, and CVE-2013-6429. CVE-2014-0054
GHSA-8cmm-qj8g-fcp6
VCID-y3uz-etva-sufh Improper Input Validation in Spring Framework In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. CVE-2020-5421
GHSA-rv39-3qh7-9v7w

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:32:09.031160+00:00 Debian Importer Fixing VCID-s7s7-tzq3-m3bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:22:02.453412+00:00 Debian Importer Fixing VCID-asmf-3c71-gqcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:14:35.146419+00:00 Debian Importer Fixing VCID-r384-aque-vqcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:13:24.112241+00:00 Debian Importer Fixing VCID-85tn-8nj1-xyak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:11:51.266714+00:00 Debian Importer Fixing VCID-eer8-apxc-2ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:53.822150+00:00 Debian Importer Fixing VCID-vkf8-5z5m-wqc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:45:06.603990+00:00 Debian Importer Fixing VCID-y3uz-etva-sufh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:08:31.451100+00:00 Debian Importer Fixing VCID-4sj2-j914-9yfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:22.229765+00:00 Debian Importer Fixing VCID-e7xv-sdvz-g7e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:56.792091+00:00 Debian Importer Fixing VCID-2nff-p7we-tuax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:06.263729+00:00 Debian Importer Fixing VCID-fv26-nhx4-dqd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:34.752827+00:00 Debian Importer Fixing VCID-ec6g-dnjb-vycb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:04.223051+00:00 Debian Importer Fixing VCID-6zda-pv5y-uybt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:02.644513+00:00 Debian Importer Fixing VCID-q4ad-g67b-efaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:17.055558+00:00 Debian Importer Fixing VCID-cpsj-4k25-wufe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:18.790108+00:00 Debian Importer Fixing VCID-pb7f-yasx-17ag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:15.583712+00:00 Debian Importer Fixing VCID-pht6-8af8-b3f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:12.460266+00:00 Debian Importer Fixing VCID-53gt-nbgk-hyc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:53.649152+00:00 Debian Importer Fixing VCID-9v66-xp9z-8kea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:57.974648+00:00 Debian Importer Fixing VCID-vac6-v6g7-a7e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:31.490175+00:00 Debian Importer Fixing VCID-3rev-eg6f-tkb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:09.513850+00:00 Debian Importer Fixing VCID-tu1q-zbk1-hbdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:10.028553+00:00 Debian Importer Fixing VCID-bpme-zq57-4uh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:07.544343+00:00 Debian Importer Fixing VCID-dfs4-emmn-f3eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:11.024845+00:00 Debian Importer Fixing VCID-kqpg-9cqw-nuen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:47.863469+00:00 Debian Importer Fixing VCID-ajex-5x84-8ygb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:51.431169+00:00 Debian Importer Fixing VCID-qpxj-fzta-v7bs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:24.375730+00:00 Debian Importer Fixing VCID-j3wr-npbv-8qcw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:48.469468+00:00 Debian Importer Fixing VCID-kpma-e8rd-b7c8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:10.814729+00:00 Debian Importer Fixing VCID-mvx7-2y3s-fbbb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:49.015068+00:00 Debian Importer Fixing VCID-mqnn-spsw-8fg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:13.104528+00:00 Debian Importer Fixing VCID-u7kk-c6fm-judy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:37.249375+00:00 Debian Importer Fixing VCID-s7s7-tzq3-m3bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:55.115549+00:00 Debian Importer Fixing VCID-asmf-3c71-gqcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:07.122477+00:00 Debian Importer Fixing VCID-r384-aque-vqcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:06:09.746726+00:00 Debian Importer Fixing VCID-85tn-8nj1-xyak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:54.754410+00:00 Debian Importer Fixing VCID-eer8-apxc-2ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:11.371003+00:00 Debian Importer Fixing VCID-vkf8-5z5m-wqc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:44:40.257853+00:00 Debian Importer Fixing VCID-y3uz-etva-sufh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:05.610537+00:00 Debian Importer Fixing VCID-4sj2-j914-9yfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:46.517903+00:00 Debian Importer Fixing VCID-e7xv-sdvz-g7e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:24.790244+00:00 Debian Importer Fixing VCID-2nff-p7we-tuax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:07.436988+00:00 Debian Importer Fixing VCID-fv26-nhx4-dqd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:46.112974+00:00 Debian Importer Fixing VCID-ec6g-dnjb-vycb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:05.275277+00:00 Debian Importer Fixing VCID-6zda-pv5y-uybt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:04.348199+00:00 Debian Importer Fixing VCID-q4ad-g67b-efaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:30.803290+00:00 Debian Importer Fixing VCID-cpsj-4k25-wufe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:35.202914+00:00 Debian Importer Fixing VCID-pb7f-yasx-17ag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:32.121979+00:00 Debian Importer Fixing VCID-pht6-8af8-b3f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:49.455874+00:00 Debian Importer Fixing VCID-53gt-nbgk-hyc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:07.868289+00:00 Debian Importer Fixing VCID-9v66-xp9z-8kea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:11.263300+00:00 Debian Importer Fixing VCID-vac6-v6g7-a7e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:37.815830+00:00 Debian Importer Fixing VCID-3rev-eg6f-tkb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:32.941076+00:00 Debian Importer Fixing VCID-tu1q-zbk1-hbdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:46.207250+00:00 Debian Importer Fixing VCID-bpme-zq57-4uh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:54.776898+00:00 Debian Importer Fixing VCID-dfs4-emmn-f3eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:19.894379+00:00 Debian Importer Fixing VCID-kqpg-9cqw-nuen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:25.753672+00:00 Debian Importer Fixing VCID-ajex-5x84-8ygb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:39.158558+00:00 Debian Importer Fixing VCID-qpxj-fzta-v7bs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:35.261033+00:00 Debian Importer Fixing VCID-j3wr-npbv-8qcw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:59.759611+00:00 Debian Importer Fixing VCID-kpma-e8rd-b7c8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:55.568574+00:00 Debian Importer Fixing VCID-mvx7-2y3s-fbbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:03.502646+00:00 Debian Importer Fixing VCID-mqnn-spsw-8fg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:37.088408+00:00 Debian Importer Fixing VCID-u7kk-c6fm-judy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:29:42.183537+00:00 Debian Importer Fixing VCID-q4ad-g67b-efaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:42.032848+00:00 Debian Importer Fixing VCID-s7s7-tzq3-m3bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.992649+00:00 Debian Importer Fixing VCID-85tn-8nj1-xyak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.879898+00:00 Debian Importer Fixing VCID-cpsj-4k25-wufe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.818576+00:00 Debian Importer Fixing VCID-y3uz-etva-sufh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.780316+00:00 Debian Importer Fixing VCID-u7kk-c6fm-judy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.739701+00:00 Debian Importer Fixing VCID-vac6-v6g7-a7e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.696617+00:00 Debian Importer Fixing VCID-pht6-8af8-b3f2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.649558+00:00 Debian Importer Fixing VCID-3rev-eg6f-tkb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.605819+00:00 Debian Importer Fixing VCID-pb7f-yasx-17ag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.560348+00:00 Debian Importer Fixing VCID-fv26-nhx4-dqd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.516518+00:00 Debian Importer Fixing VCID-4sj2-j914-9yfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.470840+00:00 Debian Importer Fixing VCID-bpme-zq57-4uh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.428449+00:00 Debian Importer Fixing VCID-qpxj-fzta-v7bs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.382473+00:00 Debian Importer Fixing VCID-mqnn-spsw-8fg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.342363+00:00 Debian Importer Fixing VCID-tu1q-zbk1-hbdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.298287+00:00 Debian Importer Fixing VCID-j3wr-npbv-8qcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.252376+00:00 Debian Importer Fixing VCID-dfs4-emmn-f3eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.211471+00:00 Debian Importer Fixing VCID-kpma-e8rd-b7c8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.169580+00:00 Debian Importer Fixing VCID-ec6g-dnjb-vycb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.126044+00:00 Debian Importer Fixing VCID-2nff-p7we-tuax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.078374+00:00 Debian Importer Fixing VCID-6zda-pv5y-uybt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:41.035253+00:00 Debian Importer Fixing VCID-9v66-xp9z-8kea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.986723+00:00 Debian Importer Fixing VCID-53gt-nbgk-hyc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.937094+00:00 Debian Importer Fixing VCID-ajex-5x84-8ygb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.888571+00:00 Debian Importer Fixing VCID-r384-aque-vqcw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.840954+00:00 Debian Importer Fixing VCID-kqpg-9cqw-nuen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.796640+00:00 Debian Importer Fixing VCID-vkf8-5z5m-wqc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.746546+00:00 Debian Importer Fixing VCID-eer8-apxc-2ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.698740+00:00 Debian Importer Fixing VCID-asmf-3c71-gqcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.650975+00:00 Debian Importer Fixing VCID-mvx7-2y3s-fbbb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:29:40.599536+00:00 Debian Importer Fixing VCID-e7xv-sdvz-g7e4 https://security-tracker.debian.org/tracker/data/json 38.1.0