Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/proftpd-dfsg@1.3.7a%2Bdfsg-12%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/proftpd-dfsg@1.3.7a%2Bdfsg-12%2Bdeb11u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (35)
Vulnerability Summary Aliases
VCID-17q4-65b3-mbbg Multiple vulnerabilities have been found in ProFTPd, the worst of which may lead to arbitrary code execution. CVE-2020-9272
VCID-1hz3-91g9-6baf The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer. CVE-2008-7265
VCID-55bs-th2b-cbfy ProFTPD: Doesn't properly handle NULL character in subjectAltName CVE-2009-3639
VCID-6kef-2azs-xugx An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be ignored, and can allow clients whose certificates have been revoked to proceed with a connection to the server. CVE-2019-19271
VCID-6zv5-sn2d-ffa6 Multiple vulnerabilities have been found in ProFTPd, the worst of which may lead to arbitrary code execution. CVE-2019-18217
VCID-73rz-xdrz-ryez security update CVE-2015-3306
VCID-7wfq-wv7z-5ubf ProFTPD is affected by mutiple vulnerabilities allowing for the remote execution of arbitrary code. CVE-2006-6171
VCID-8yrv-hee2-9qdc A vulnerability in ProFTPD could result in the arbitrary execution of code. CVE-2019-12815
VCID-bgf6-swz8-j7bt Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2010-3867
VCID-bxzy-3wt7-vybn ProFTPD is affected by mutiple vulnerabilities allowing for the remote execution of arbitrary code. CVE-2006-6170
VCID-c26f-t6bh-fkc6 ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user. CVE-2017-7418
VCID-ca3u-gmsu-7ugq ProFTPD is affected by mutiple vulnerabilities allowing for the remote execution of arbitrary code. CVE-2006-5815
VCID-cbu1-85d6-5bhz The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors. CVE-2016-3125
VCID-fn5e-rmve-c3f4 Multiple vulnerabilities have been found in ProFTPd, the worst of which may lead to arbitrary code execution. CVE-2020-9273
VCID-gskk-nnr5-ukac The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd. CVE-2007-2165
VCID-gw9f-rc1s-8udd Buffer Overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a Denial of Service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. CVE-2024-57392
VCID-jczb-y4fh-xucn A vulnerability has been discovered in ProFTPd which could result in memory disclosure. CVE-2021-46854
VCID-jxke-yeum-8fh2 Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2013-4359
VCID-jzn6-bzzf-nugp Improper Validation of Integrity Check Value The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. CVE-2023-48795
GHSA-45x7-px36-x8w8
VCID-n5dr-ejmr-2ug9 Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2011-4130
VCID-pb79-dt2c-y7ha Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password. CVE-2005-4816
VCID-pcah-e3hh-gbd7 In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql. CVE-2024-48651
VCID-r4vc-yu6n-kkhe Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2012-6095
VCID-rxsr-2wwv-qfgj A flaw in ProFTPD may allow a local attacker to obtain root privileges. CVE-2006-6563
VCID-s84k-unmk-ubgt Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2010-4652
VCID-tc5c-pyzn-ekh1 An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. Failure to check for the appropriate field of a CRL entry (checking twice for subject, rather than once for subject and once for issuer) prevents some valid CRLs from being taken into account, and can allow clients whose certificates have been revoked to proceed with a connection to the server. CVE-2019-19270
VCID-u7k3-9pb6-nqa8 make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics. CVE-2023-51713
VCID-u8pb-1kgt-z3fp Two vulnerabilities in ProFTPD might allow for SQL injection attacks. CVE-2009-0542
VCID-v1n2-dgwq-6bgh proftpd CSRF attack CVE-2008-4242
VCID-v3k9-71y7-e7bu Two vulnerabilities in ProFTPD might allow for SQL injection attacks. CVE-2009-0543
VCID-wwz1-zb24-7qgy Multiple vulnerabilities have been found in ProFTPd, the worst of which may lead to arbitrary code execution. CVE-2019-19269
VCID-xeeh-rpu9-63g6 An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup. CVE-2019-19272
VCID-xmjm-ep49-1uh2 Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2011-1137
VCID-xzye-g5rw-fyh5 Multiple vulnerabilities have been found in GraphicsMagick, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition. CVE-2009-3736
VCID-y3j2-e8hq-w3em Multiple vulnerabilities have been found in ProFTPD, the worst of which leading to remote execution of arbitrary code. CVE-2010-4221

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:29:36.134688+00:00 Debian Importer Fixing VCID-s84k-unmk-ubgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:23:52.141722+00:00 Debian Importer Fixing VCID-xeeh-rpu9-63g6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:23.329194+00:00 Debian Importer Fixing VCID-8yrv-hee2-9qdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:13:07.553019+00:00 Debian Importer Fixing VCID-jzn6-bzzf-nugp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:05:45.750813+00:00 Debian Importer Fixing VCID-ca3u-gmsu-7ugq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:03:44.938476+00:00 Debian Importer Fixing VCID-gskk-nnr5-ukac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:46.858327+00:00 Debian Importer Fixing VCID-17q4-65b3-mbbg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:52.910689+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:55:23.402387+00:00 Debian Importer Fixing VCID-fn5e-rmve-c3f4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:52:01.151772+00:00 Debian Importer Fixing VCID-xmjm-ep49-1uh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:51:23.827376+00:00 Debian Importer Fixing VCID-jxke-yeum-8fh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:34:43.541269+00:00 Debian Importer Fixing VCID-wwz1-zb24-7qgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:43.586419+00:00 Debian Importer Fixing VCID-y3j2-e8hq-w3em https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:27:08.905798+00:00 Debian Importer Fixing VCID-pcah-e3hh-gbd7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:23.683888+00:00 Debian Importer Fixing VCID-v1n2-dgwq-6bgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:12.818319+00:00 Debian Importer Fixing VCID-tc5c-pyzn-ekh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:43.817001+00:00 Debian Importer Fixing VCID-6kef-2azs-xugx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:50.367260+00:00 Debian Importer Fixing VCID-bxzy-3wt7-vybn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:31.132736+00:00 Debian Importer Fixing VCID-7wfq-wv7z-5ubf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:33.746413+00:00 Debian Importer Fixing VCID-u8pb-1kgt-z3fp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:47.421400+00:00 Debian Importer Fixing VCID-1hz3-91g9-6baf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:09.665798+00:00 Debian Importer Fixing VCID-v3k9-71y7-e7bu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:47.092613+00:00 Debian Importer Fixing VCID-pb79-dt2c-y7ha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:30.083290+00:00 Debian Importer Fixing VCID-rxsr-2wwv-qfgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:16.355171+00:00 Debian Importer Fixing VCID-cbu1-85d6-5bhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:42.424793+00:00 Debian Importer Fixing VCID-u7k3-9pb6-nqa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:51.467635+00:00 Debian Importer Fixing VCID-55bs-th2b-cbfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:41.068039+00:00 Debian Importer Fixing VCID-n5dr-ejmr-2ug9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:24.458343+00:00 Debian Importer Fixing VCID-73rz-xdrz-ryez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:50.111044+00:00 Debian Importer Fixing VCID-bgf6-swz8-j7bt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:34.857530+00:00 Debian Importer Fixing VCID-jczb-y4fh-xucn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:13.032651+00:00 Debian Importer Fixing VCID-c26f-t6bh-fkc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:50.797674+00:00 Debian Importer Fixing VCID-r4vc-yu6n-kkhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:46.924794+00:00 Debian Importer Fixing VCID-6zv5-sn2d-ffa6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:41.567995+00:00 Debian Importer Fixing VCID-s84k-unmk-ubgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:24.937108+00:00 Debian Importer Fixing VCID-xeeh-rpu9-63g6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:26.233490+00:00 Debian Importer Fixing VCID-8yrv-hee2-9qdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:05:55.392741+00:00 Debian Importer Fixing VCID-jzn6-bzzf-nugp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:00:17.436716+00:00 Debian Importer Fixing VCID-ca3u-gmsu-7ugq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:48.765620+00:00 Debian Importer Fixing VCID-gskk-nnr5-ukac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:04.442483+00:00 Debian Importer Fixing VCID-17q4-65b3-mbbg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:19.869264+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:25.479262+00:00 Debian Importer Fixing VCID-fn5e-rmve-c3f4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:56.671427+00:00 Debian Importer Fixing VCID-xmjm-ep49-1uh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:26.439455+00:00 Debian Importer Fixing VCID-jxke-yeum-8fh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:52.879365+00:00 Debian Importer Fixing VCID-wwz1-zb24-7qgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:34.959848+00:00 Debian Importer Fixing VCID-y3j2-e8hq-w3em https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:25.711814+00:00 Debian Importer Fixing VCID-pcah-e3hh-gbd7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:46.404717+00:00 Debian Importer Fixing VCID-v1n2-dgwq-6bgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:07.799977+00:00 Debian Importer Fixing VCID-tc5c-pyzn-ekh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:14.766230+00:00 Debian Importer Fixing VCID-6kef-2azs-xugx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:24.812561+00:00 Debian Importer Fixing VCID-bxzy-3wt7-vybn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:30.706698+00:00 Debian Importer Fixing VCID-7wfq-wv7z-5ubf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:25.307769+00:00 Debian Importer Fixing VCID-u8pb-1kgt-z3fp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:02.452645+00:00 Debian Importer Fixing VCID-1hz3-91g9-6baf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:08.669981+00:00 Debian Importer Fixing VCID-v3k9-71y7-e7bu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:37.433063+00:00 Debian Importer Fixing VCID-pb79-dt2c-y7ha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:23.915422+00:00 Debian Importer Fixing VCID-rxsr-2wwv-qfgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:57.787155+00:00 Debian Importer Fixing VCID-cbu1-85d6-5bhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:46.466625+00:00 Debian Importer Fixing VCID-u7k3-9pb6-nqa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:22.272047+00:00 Debian Importer Fixing VCID-55bs-th2b-cbfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:56.021013+00:00 Debian Importer Fixing VCID-n5dr-ejmr-2ug9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:38.063248+00:00 Debian Importer Fixing VCID-73rz-xdrz-ryez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:43.495641+00:00 Debian Importer Fixing VCID-bgf6-swz8-j7bt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:48.814511+00:00 Debian Importer Fixing VCID-jczb-y4fh-xucn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:58.543057+00:00 Debian Importer Fixing VCID-c26f-t6bh-fkc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:25.420036+00:00 Debian Importer Fixing VCID-r4vc-yu6n-kkhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:23.346093+00:00 Debian Importer Fixing VCID-6zv5-sn2d-ffa6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:50:21.634766+00:00 Debian Importer Fixing VCID-gw9f-rc1s-8udd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.581478+00:00 Debian Importer Fixing VCID-pcah-e3hh-gbd7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.528752+00:00 Debian Importer Fixing VCID-u7k3-9pb6-nqa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.466669+00:00 Debian Importer Fixing VCID-jzn6-bzzf-nugp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.407561+00:00 Debian Importer Fixing VCID-jczb-y4fh-xucn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.357628+00:00 Debian Importer Fixing VCID-fn5e-rmve-c3f4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.310137+00:00 Debian Importer Fixing VCID-17q4-65b3-mbbg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.267997+00:00 Debian Importer Fixing VCID-xeeh-rpu9-63g6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.227179+00:00 Debian Importer Fixing VCID-6kef-2azs-xugx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.183263+00:00 Debian Importer Fixing VCID-tc5c-pyzn-ekh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.130420+00:00 Debian Importer Fixing VCID-wwz1-zb24-7qgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.081506+00:00 Debian Importer Fixing VCID-6zv5-sn2d-ffa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:21.032184+00:00 Debian Importer Fixing VCID-8yrv-hee2-9qdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.983364+00:00 Debian Importer Fixing VCID-c26f-t6bh-fkc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.933847+00:00 Debian Importer Fixing VCID-cbu1-85d6-5bhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.884537+00:00 Debian Importer Fixing VCID-73rz-xdrz-ryez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.835481+00:00 Debian Importer Fixing VCID-jxke-yeum-8fh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.786135+00:00 Debian Importer Fixing VCID-r4vc-yu6n-kkhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.737295+00:00 Debian Importer Fixing VCID-n5dr-ejmr-2ug9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.688289+00:00 Debian Importer Fixing VCID-xmjm-ep49-1uh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.642094+00:00 Debian Importer Fixing VCID-s84k-unmk-ubgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.597898+00:00 Debian Importer Fixing VCID-y3j2-e8hq-w3em https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.551178+00:00 Debian Importer Fixing VCID-bgf6-swz8-j7bt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.509630+00:00 Debian Importer Fixing VCID-xzye-g5rw-fyh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.468247+00:00 Debian Importer Fixing VCID-55bs-th2b-cbfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.424680+00:00 Debian Importer Fixing VCID-v3k9-71y7-e7bu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.374148+00:00 Debian Importer Fixing VCID-u8pb-1kgt-z3fp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.328472+00:00 Debian Importer Fixing VCID-1hz3-91g9-6baf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.284285+00:00 Debian Importer Fixing VCID-v1n2-dgwq-6bgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.236773+00:00 Debian Importer Fixing VCID-gskk-nnr5-ukac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.194223+00:00 Debian Importer Fixing VCID-rxsr-2wwv-qfgj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.144847+00:00 Debian Importer Fixing VCID-7wfq-wv7z-5ubf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.096523+00:00 Debian Importer Fixing VCID-bxzy-3wt7-vybn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:20.047033+00:00 Debian Importer Fixing VCID-ca3u-gmsu-7ugq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:19.995858+00:00 Debian Importer Fixing VCID-pb79-dt2c-y7ha https://security-tracker.debian.org/tracker/data/json 38.1.0