Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/lucene-solr@0?distro=trixie
purl pkg:deb/debian/lucene-solr@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (22)
Vulnerability Summary Aliases
VCID-1m9m-xudm-47hw Unrestricted upload of file with dangerous type in Apache Solr The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server. CVE-2019-12409
GHSA-2289-pqfq-6wx7
VCID-3gq7-8e2z-yqcv Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles" * A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read". * A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission * A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway) Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role.  Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1. CVE-2026-22022
GHSA-qr3p-2xj2-q7hq
VCID-3vmh-e7x6-3kf6 Incorrect Authorization in Apache Solr When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. CVE-2021-29943
GHSA-vf7p-j8x6-xvwp
VCID-418m-x1un-gufd Apache Solr: Insufficient file-access checking in standalone core-creation requests The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes.  Solr deployments are subject to this vulnerability if they meet the following criteria: * Solr is running in its "standalone" mode. * Solr's "allowPath" setting is being used to restrict file access to certain directories. * Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles. Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue. CVE-2026-22444
GHSA-vc2w-4v3p-2mqw
VCID-49bu-dy1u-2fb9 Improper Neutralization of Input During Web Page Generation in Apache Solr Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object. CVE-2014-3628
GHSA-wgw2-gw4v-9w4j
VCID-5esr-zs91-zbb5 Improper Neutralization of Input During Web Page Generation in Apache Solr Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, related to webapp/web/js/scripts/schema-browser.js. CVE-2015-8795
GHSA-mx2h-hf7j-2x3p
VCID-835p-mav1-1qem Incorrect Authorization in Apache Solr Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions. This issue is patched in 8.6.3. CVE-2020-13957
GHSA-3c7p-vv5r-cmr5
VCID-9dma-s4ye-3ued Insecure Default Initialization of Resource vulnerability in Apache Solr New ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the "trusted" metadata. ConfigSets that do not contain the flag are trusted implicitly if the metadata is missing, therefore this leads to "trusted" ConfigSets that may not have been created with an Authenticated request. "trusted" ConfigSets are able to load custom code into classloaders, therefore the flag is supposed to only be set when the request that uploads the ConfigSet is Authenticated & Authorized. This issue affects Apache Solr: from 6.6.0 before 8.11.4, from 9.0.0 before 9.7.0. This issue does not affect Solr instances that are secured via Authentication/Authorization. Users are primarily recommended to use Authentication and Authorization when running Solr. However, upgrading to version 9.7.0, or 8.11.4 will mitigate this issue otherwise. CVE-2024-45217
GHSA-h7w9-c5vx-x7j3
VCID-a4yf-9j54-e3cp Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr This issue only affects Windows. CVE-2021-44548
GHSA-pccr-q7v9-5f27
VCID-gfmc-r1h7-dfhs This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs. CVE-2018-8010
GHSA-rc9v-h28f-jcmf
VCID-keda-efkh-y3fg Apache Solr allows read access to host environmet variables Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API. CVE-2023-50290
GHSA-gg7w-pw2r-x2cq
VCID-r413-tvjg-mfh3 Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected. CVE-2017-7660
GHSA-c82r-qg3w-q5mv
VCID-r6fw-42tv-vueu Apache Solr Cross-site scripting Vulnerability Cross-site scripting (XSS) vulnerability in `webapp/web/js/scripts/schema-browser.js` in the Admin UI in Apache Solr before 5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted schema-browse URL. CVE-2015-8796
GHSA-4fxw-g29w-r8mx
VCID-uaxq-nmwp-5uct Apache Solr Relative Path Traversal vulnerability Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users. CVE-2024-52012
GHSA-4p5m-gvpf-f3x5
VCID-vkyg-mj2g-bqgp This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability. CVE-2018-8026
GHSA-7px3-6f6g-hxcj
VCID-vrdm-7wfj-qbht Improper Authentication vulnerability in Apache Solr Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path. This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing. This issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0. Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue. CVE-2024-45216
GHSA-mjvf-4h88-6xm3
VCID-vsgv-kss4-nqcb Incorrect Authorization in Apache Solr In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 6.6.6 and 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin). CVE-2018-11802
GHSA-j346-h5wc-rw2m
VCID-vvt2-qyef-3fa6 Improper Neutralization of Input During Web Page Generation in Apache Solr Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/plugins.js in the stats page in the Admin UI in Apache Solr before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via the entry parameter to a plugins/cache URI. CVE-2015-8797
GHSA-v6gf-x8fp-532v
VCID-xypj-xu8p-gkbs Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Apache Solr 6.6.1 onwards. CVE-2017-9803
GHSA-f553-j2gv-g5r9
VCID-z2u5-9szx-vyax Deserialization of Untrusted Data In Apache Solr versions, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side. CVE-2019-0192
GHSA-xhcq-fv7x-grr2
VCID-zfk3-8kt1-gbbw Apache Solr vulnerable to XML Bomb Solr versions prior to 5.0.0 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it?s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses the XML causing OOMs. CVE-2019-12401
GHSA-jq2w-w7v2-69q5
VCID-zrn1-s7ht-pbdt Improper permission handling in Apache Solr When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. CVE-2021-29262
GHSA-jgcr-fg3g-qvw8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:30:09.335976+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:27:09.215946+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:41.262699+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:53.329119+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:10.891440+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:38.548325+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:10.077982+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:47.727112+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:24.071646+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:14.521129+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:54.581841+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:21.627035+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:58.215955+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:47.319111+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:04.333842+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:43.375294+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:42.863820+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:31.494592+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:07.476980+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:28.649322+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:15.811288+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:52.901589+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:19:06.316590+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:55.245057+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:02.918152+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:11.074289+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:11.552550+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:09.583755+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:08.313799+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:15.949925+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:41.330680+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:48.461735+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:36.132389+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:14.516469+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:14.377797+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:42.547616+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:37.243552+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:07.204248+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:56.418550+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:52.650793+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:44.082420+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:46.002801+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:36.848655+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:53.011237+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:45:23.899328+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.864886+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.796038+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.761026+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.725230+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.552389+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.517864+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.483070+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.448489+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.359960+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.281844+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.247519+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.176446+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.141518+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.107169+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.030339+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.995925+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.961135+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.836481+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.801910+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.767698+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.733128+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.1.0