Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (154)
Vulnerability Summary Aliases
VCID-12eh-yc81-afaa The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file. CVE-2017-6415
VCID-1h97-tkwz-8kfr A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. This issue affects the function r_cons_is_breaked in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". An additional warning regarding threading support has been added. CVE-2025-5641
VCID-1jmy-vuq8-8ufa Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. CVE-2022-0713
VCID-1peb-3y84-tfft In radare2 prior to 3.1.2, the parseOperands function in libr/asm/arch/arm/armass64.c allows attackers to cause a denial-of-service (application crash caused by stack-based buffer overflow) by crafting an input file. CVE-2018-20460
VCID-1pp7-8yu7-8kfy There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file. CVE-2018-12322
VCID-27ek-n7rv-1fdw The cmd_info function in libr/core/cmd_info.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted binary file. CVE-2017-9762
VCID-2c7v-zpy1-vba9 The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. CVE-2017-6448
VCID-2gc7-kn57-b3ak The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file. CVE-2018-11378
VCID-2hsg-v6h9-e7er A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0. CVE-2022-28071
VCID-2m2p-3v1v-3ueq In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash via a stack-based buffer overflow) by crafting an input file, a related issue to CVE-2018-20456. CVE-2018-20455
VCID-2r7v-s8mc-e7gr radare2 v5.9.8 and before contains a memory leak in the function r2r_subprocess_init. CVE-2025-60360
VCID-2u2h-ryzx-wker The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02. CVE-2017-9949
VCID-2y64-np9y-zyfz A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5648
VCID-378y-5cww-y7eb radare2 v5.9.8 and before contains a memory leak in the function bochs_open. CVE-2025-60361
VCID-3px7-6e74-cqfe In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command. CVE-2019-12865
VCID-3r1r-24qj-zyef In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables. CVE-2019-16718
VCID-3wjf-z8kn-23g1 In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c. CVE-2019-12790
VCID-41wv-efp7-23cn In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This error is due to improper sh_size validation when allocating memory. CVE-2017-16357
VCID-428v-jh9w-g3g6 grub2: Stack exhaustion in grub_ext2_read_block CVE-2017-9763
VCID-4b1u-hdsa-zfb9 The r_read_* functions in libr/include/r_endian.h in radare2 1.2.1 allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by the r_read_le32 function. CVE-2017-6197
VCID-4vtd-8wb9-mqg9 The get_relocs_64 function in libr/bin/format/mach0/mach0.c in radare2 1.3.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted Mach0 file. CVE-2017-7946
VCID-54v3-r36b-pqbt The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. CVE-2018-11382
VCID-56w7-1t75-ckc9 The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. CVE-2017-7854
VCID-5hrv-qq76-mbcd The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file. CVE-2017-6387
VCID-5kmb-6m89-6uc6 A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4.0. CVE-2022-28072
VCID-5msy-yj5v-myc7 In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.c, a related issue to CVE-2018-20459. CVE-2018-20457
VCID-5q53-gqkq-27ev The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file. CVE-2018-14016
VCID-5rv8-9w1a-9yag heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. CVE-2022-1284
VCID-5xy5-6f5d-83c7 Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. CVE-2022-1297
VCID-627w-z5ne-kye4 The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. CVE-2018-11381
VCID-6bbs-9d9s-mfeq A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5647
VCID-6s39-wdz1-yuhz radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. CVE-2019-19647
VCID-6zbf-v2qf-kudb Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. CVE-2022-1296
VCID-71pg-p4ht-pudf A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn). CVE-2020-27795
VCID-73nh-61r2-4kfr getToken in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (stack-based buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. CVE-2018-19842
VCID-797x-2rdg-efbq In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input. CVE-2019-19590
VCID-7f5v-63rw-47c5 radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. CVE-2021-44975
VCID-7gtx-pkzb-yqcz radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affects libr/asm/asm.c and libr/parse/parse.c. CVE-2019-12829
VCID-7hzf-vk9r-dfh1 heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. CVE-2022-1244
VCID-7j2z-8s5s-6ugb In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting a binary file. CVE-2018-20461
VCID-7jxc-2agn-8kd2 A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0. CVE-2022-28070
VCID-7p7w-jwbj-guea In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. CVE-2017-16359
VCID-8bzm-ye49-w7fc The store_versioninfo_gnu_verdef function in libr/bin/format/elf/elf.c in radare2 2.0.0 allows remote attackers to cause a denial of service (r_read_le16 invalid write and application crash) or possibly have unspecified other impact via a crafted ELF file. CVE-2017-15385
VCID-8xen-g6z6-hfcs Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). CVE-2022-1649
VCID-8zuq-cnzg-9bfk A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. CVE-2021-4021
VCID-9cdv-pbch-47cp Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. CVE-2023-4322
VCID-9nn6-cp89-qkd3 The r_bin_java_annotation_new function in shlr/java/class.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted .class file because of missing input validation in r_bin_java_line_number_table_attr_new. CVE-2018-14017
VCID-9yq7-v9ah-qyek An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. CVE-2023-46570
VCID-9zrm-xdkz-fbfb A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5646
VCID-a4ec-hp76-rqcv The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file. CVE-2017-9520
VCID-a4us-jxhs-nfgh The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. CVE-2018-11375
VCID-aekg-54vs-6yca In radare2 2.4.0, there is a heap-based buffer over-read in the get_ivar_list_t function of mach0_classes.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted Mach-O file. CVE-2018-8810
VCID-ak4h-uq4k-23hs In radare2 through 3.1.3, the armass_assemble function in libr/asm/arch/arm/armass.c allows attackers to cause a denial-of-service (application crash by out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.c, a related issue to CVE-2018-20457. CVE-2018-20459
VCID-aubp-kw7t-abam Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6. CVE-2022-0849
VCID-aupe-75b8-fbff heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. CVE-2022-1444
VCID-ausu-fn3w-kueu The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file. CVE-2018-11379
VCID-avnf-p1zx-47ce Radare2 has a division by zero vulnerability in Mach-O parser's rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service. CVE-2021-32494
VCID-awv9-a65t-gfax A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5643
VCID-ba9q-e289-ekbt In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg). CVE-2019-12802
VCID-befg-btu3-g3ek Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2. CVE-2022-0519
VCID-bkmk-u5ep-w3cq In radare2 2.5.0, there is a heap-based buffer over-read in the dalvik_op function (libr/anal/p/anal_dalvik.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted DEX file. Note that this issue is different from CVE-2018-8809, which was patched earlier. CVE-2018-10187
VCID-bmmz-g7bb-6ydp An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. CVE-2023-46569
VCID-bws2-var3-a3au radare2 v.5.9.8 and before contains a memory leak in the function _load_relocations. CVE-2025-60358
VCID-cbnj-ccs4-4uap radare2 4.5.0 misparses signature information in PE files, causing a segmentation fault in r_x509_parse_algorithmidentifier in libr/util/x509.c. This is due to a malformed object identifier in IMAGE_DIRECTORY_ENTRY_SECURITY. CVE-2020-17487
VCID-ccqg-j1n1-dqb8 A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0. CVE-2022-28068
VCID-czpx-39nm-3fhk radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. CVE-2021-44974
VCID-dpfc-t7cc-uqef Out-of-bounds Write vulnerability in radareorg radare2 allows heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9. CVE-2025-1744
VCID-drqw-6fx3-augx Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. CVE-2022-0695
VCID-ds17-huzd-37d2 Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2. CVE-2022-0521
VCID-dzzp-5yb2-h7fq A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4.0. CVE-2022-28073
VCID-e1ry-7wyr-z7gt Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6. CVE-2022-1052
VCID-e4sm-emrh-qkc9 Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary. CVE-2022-1207
VCID-e8zb-wjjn-ubd9 radare2 4.5.0 misparses DWARF information in executable files, causing a segmentation fault in parse_typedef in type_dwarf.c via a malformed DW_AT_name in the .debug_info section. CVE-2020-16269
VCID-egzy-8xjc-muc1 In radare2 2.4.0, there is a heap-based buffer over-read in the r_asm_disassemble function of asm.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted dex file. CVE-2018-8808
VCID-esdn-avz7-c3g4 Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0. CVE-2022-0139
VCID-euwf-e2ud-wban Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. CVE-2023-1605
VCID-ev6a-h3yd-5udh Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in radareorg radare2 allows Overflow Buffers.This issue affects radare2: before <5.9.9. CVE-2025-1864
VCID-fktn-5h3c-t3ay Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. CVE-2022-0559
VCID-fuw5-x3dd-6yg8 The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to cause a denial of service (invalid free and application crash) via a crafted ELF file because of an uninitialized variable in the CPSE handler in libr/anal/p/anal_avr.c. CVE-2018-11383
VCID-gebx-34kc-xuh6 radare2 v5.9.8 and before contains a memory leak in the function r_bin_object_new. CVE-2025-60359
VCID-gmtk-srvb-byek There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file. CVE-2018-12321
VCID-gn9n-bv7p-bbap Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. CVE-2022-0518
VCID-gqsh-nqdu-3qex A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component. CVE-2025-1378
VCID-gy1s-hmrp-fbdg A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5644
VCID-h43t-cy2h-jfdv Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. CVE-2022-1061
VCID-h4qz-m51b-5khw The relocs function in libr/bin/p/bin_bflt.c in radare2 1.2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file. CVE-2017-6194
VCID-hkwf-9xsj-xqct Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. CVE-2022-1437
VCID-hvrq-x6mt-nuad In radare2 2.0.1, libr/bin/dwarf.c allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file, related to r_bin_dwarf_parse_comp_unit in dwarf.c and sdb_set_internal in shlr/sdb/src/sdb.c. CVE-2017-16805
VCID-j79s-4ev5-jucd The read_u32_leb128 function in libr/util/uleb128.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. CVE-2017-7716
VCID-jb8a-6f7d-hkas A NULL pointer dereference vulnerability was discovered in radare2 6.0.5 and earlier within the info() function of bin_ne.c. A crafted binary input can trigger a segmentation fault, leading to a denial of service when the tool processes malformed data. CVE-2025-63745
VCID-khyh-e434-x3hk radare2 is vulnerable to Out-of-bounds Read CVE-2022-0173
VCID-m715-ppbg-xya5 CVE-2026-41015
VCID-mcfw-hm7m-uuh5 In radare2 2.5.0, there is a heap-based buffer over-read in the r_hex_bin2str function (libr/util/hex.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted DEX file. This issue is different from CVE-2017-15368. CVE-2018-10186
VCID-myn1-h1xa-5ba7 The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file. CVE-2018-11380
VCID-n5c5-p9qk-zkgz NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system. CVE-2022-1382
VCID-nh84-fufj-pfgr Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. CVE-2022-0676
VCID-njkh-gajt-x3cx There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file. CVE-2018-12320
VCID-nnye-265s-hfdm Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields. CVE-2024-29646
VCID-nuzb-2zqv-wbgf NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash). CVE-2022-1283
VCID-ny2r-28hp-5uep Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. CVE-2023-5686
VCID-p5f7-7r1a-rycr NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. CVE-2022-0419
VCID-patn-amhm-cqcp Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2. CVE-2023-0302
VCID-pme4-1y6v-4ybu A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. CVE-2021-3673
VCID-pq2q-hnd2-y3eb Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. CVE-2024-29645
VCID-pqrq-1jus-tkep In radare 2.0.1, an out-of-bounds read vulnerability exists in string_scan_range() in libr/bin/bin.c when doing a string search. CVE-2017-16358
VCID-pt1y-cpch-1qfn Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). CVE-2022-1238
VCID-pu3q-x2ey-zydp An issue in radare2 v5.8.0 through v5.9.4 allows a local attacker to cause a denial of service via the __bf_div function. CVE-2024-48241
VCID-pz9s-ebvf-77c5 The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function in kern/disk.c in GNU GRUB 2.02. CVE-2017-10929
VCID-q9et-b46r-nfhd A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing​ CVE-2024-11858
VCID-qtjk-bakx-nyar The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. CVE-2017-15368
VCID-qvdt-rhku-v7cb The r_read_le32() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file. CVE-2018-11376
VCID-rgst-sefy-mya3 Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6. CVE-2022-1031
VCID-rwf4-6fjk-cqfp opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. CVE-2018-19843
VCID-sf7m-amp2-ebde The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. CVE-2018-11377
VCID-sgqw-g5s2-6ydd NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. CVE-2022-4843
VCID-shpa-bmwh-yqb8 In radare2 before 2.9.0, a heap overflow vulnerability exists in the read_module_referenced_functions function in libr/anal/flirt.c via a crafted flirt signature file. CVE-2018-15834
VCID-sk4s-yzns-jfbk Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. CVE-2022-4398
VCID-sua7-jxfv-tfhe A vulnerability classified as problematic has been found in Radare2 5.9.9. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5642
VCID-swsv-3s4g-kbea An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack. CVE-2020-27793
VCID-tbyx-yrx3-vfag Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). CVE-2022-1240
VCID-tdq4-q57q-ufht Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. CVE-2022-1714
VCID-te26-ushn-aybj An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. CVE-2024-26475
VCID-tqf6-xzpu-37d9 Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). CVE-2022-1451
VCID-tww2-m12z-sbbv In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file. CVE-2018-20458
VCID-uxqx-tssw-jqfz In radare2 2.4.0, there is a heap-based buffer over-read in the dalvik_op function of anal_dalvik.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted dex file. CVE-2018-8809
VCID-uzg5-a999-afhp security update CVE-2015-2305
VCID-v386-f2n9-8ya1 The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. CVE-2017-6319
VCID-v71n-cp33-7uc9 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4. CVE-2022-0712
VCID-v7dw-jebk-xybc A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5645
VCID-v86n-wjus-g7h5 radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c. CVE-2023-27114
VCID-vemn-pw8w-y3dq The sh_op() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file. CVE-2018-11384
VCID-vfpa-egy5-xfad The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c. CVE-2018-14015
VCID-w45p-1p1t-tkav Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file. CVE-2022-34520
VCID-w5bc-f4gs-aqa6 Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). CVE-2022-1237
VCID-wbqn-8k7x-bbc6 The find_eoq function in libr/core/cmd.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. CVE-2017-9761
VCID-wgf3-z9qx-y7gc In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. CVE-2018-20456
VCID-wkg7-9vfg-rbgc radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. CVE-2023-47016
VCID-wqu2-yhcs-tqgh In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c via crafted ELF files when parsing the ELF version on 32bit systems. CVE-2017-15932
VCID-wtnj-8rc9-tuaj In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory. CVE-2020-15121
VCID-wxqc-aaxn-3ud4 In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. CVE-2021-32613
VCID-wxu7-ngjj-jbac A NULL pointer dereference vulnerability was discovered in radare2 6.0.5 and earlier within the load() function of bin_dyldcache.c. Processing a crafted file can cause a segmentation fault and crash the program. CVE-2025-63744
VCID-x1ew-h8tp-67c2 Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. CVE-2022-1899
VCID-x9x1-xeec-z7ej In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c via crafted ELF files on 32bit systems. CVE-2017-15931
VCID-xgjj-4vb7-uubp Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file. CVE-2022-34502
VCID-xuw5-8svs-p3a7 A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0. CVE-2022-28069
VCID-xype-sjmg-s3gz In radare2 before 3.7.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to improper handling of symbol names embedded in executables. CVE-2019-14745
VCID-y9b9-yzvm-e3df Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. CVE-2022-1383
VCID-yhm8-zjrk-ykh3 A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash. CVE-2020-27794
VCID-yjkb-tsqy-uqa5 The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file. CVE-2017-7274
VCID-ynz2-8u9q-2yba Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. CVE-2022-0523
VCID-yuwd-fh9w-5bc3 Radare2 has a use-after-free vulnerability in pyc parser's get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service. CVE-2021-32495
VCID-yycm-mx2c-tkae Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. CVE-2022-1809
VCID-z1c6-6naw-byeg Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). CVE-2022-1452
VCID-zec6-qhn1-4qh2 Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. CVE-2022-0476

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-17T22:44:43.271282+00:00 Debian Importer Fixing VCID-m715-ppbg-xya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:31:52.854486+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:31:27.661424+00:00 Debian Importer Fixing VCID-54v3-r36b-pqbt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:29:47.986150+00:00 Debian Importer Fixing VCID-5msy-yj5v-myc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:29:13.939731+00:00 Debian Importer Fixing VCID-zec6-qhn1-4qh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:21:12.514183+00:00 Debian Importer Fixing VCID-patn-amhm-cqcp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:20:44.462882+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:39.144124+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:15:50.050852+00:00 Debian Importer Fixing VCID-v386-f2n9-8ya1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:14:55.045736+00:00 Debian Importer Fixing VCID-5kmb-6m89-6uc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:14:42.360586+00:00 Debian Importer Fixing VCID-797x-2rdg-efbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:14:27.610570+00:00 Debian Importer Fixing VCID-2c7v-zpy1-vba9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:12:30.844056+00:00 Debian Importer Fixing VCID-uzg5-a999-afhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:12:27.509714+00:00 Debian Importer Fixing VCID-myn1-h1xa-5ba7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:47.722389+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:09:31.293319+00:00 Debian Importer Fixing VCID-yjkb-tsqy-uqa5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:57.883961+00:00 Debian Importer Fixing VCID-dzzp-5yb2-h7fq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:19.790123+00:00 Debian Importer Fixing VCID-avnf-p1zx-47ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:06:39.686050+00:00 Debian Importer Fixing VCID-tqf6-xzpu-37d9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:29.507408+00:00 Debian Importer Fixing VCID-gmtk-srvb-byek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:20.606164+00:00 Debian Importer Fixing VCID-mcfw-hm7m-uuh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:03:44.047453+00:00 Debian Importer Fixing VCID-4b1u-hdsa-zfb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:38.717223+00:00 Debian Importer Fixing VCID-9yq7-v9ah-qyek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:58:23.121199+00:00 Debian Importer Fixing VCID-nuzb-2zqv-wbgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:56:47.863929+00:00 Debian Importer Fixing VCID-sk4s-yzns-jfbk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:56:33.225024+00:00 Debian Importer Fixing VCID-2hsg-v6h9-e7er https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:56:21.232308+00:00 Debian Importer Fixing VCID-3wjf-z8kn-23g1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:51:13.655172+00:00 Debian Importer Fixing VCID-9cdv-pbch-47cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:50:54.054151+00:00 Debian Importer Fixing VCID-aubp-kw7t-abam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:47:44.338360+00:00 Debian Importer Fixing VCID-pqrq-1jus-tkep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:46:36.426305+00:00 Debian Importer Fixing VCID-fktn-5h3c-t3ay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:57.909500+00:00 Debian Importer Fixing VCID-sf7m-amp2-ebde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:53.857263+00:00 Debian Importer Fixing VCID-2gc7-kn57-b3ak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:39:15.850676+00:00 Debian Importer Fixing VCID-8bzm-ye49-w7fc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:38:32.214273+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:36:33.694250+00:00 Debian Importer Fixing VCID-5rv8-9w1a-9yag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:44.003565+00:00 Debian Importer Fixing VCID-x9x1-xeec-z7ej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:16.393761+00:00 Debian Importer Fixing VCID-tdq4-q57q-ufht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:32:07.770976+00:00 Debian Importer Fixing VCID-fuw5-x3dd-6yg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:34.398670+00:00 Debian Importer Fixing VCID-428v-jh9w-g3g6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:31.293062+00:00 Debian Importer Fixing VCID-wxu7-ngjj-jbac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:19.034359+00:00 Debian Importer Fixing VCID-vfpa-egy5-xfad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:27:30.097113+00:00 Debian Importer Fixing VCID-wqu2-yhcs-tqgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:54.509713+00:00 Debian Importer Fixing VCID-qtjk-bakx-nyar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:49.124825+00:00 Debian Importer Fixing VCID-xype-sjmg-s3gz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:36.449520+00:00 Debian Importer Fixing VCID-ak4h-uq4k-23hs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:03.797398+00:00 Debian Importer Fixing VCID-pt1y-cpch-1qfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:12.381995+00:00 Debian Importer Fixing VCID-aupe-75b8-fbff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:53.155219+00:00 Debian Importer Fixing VCID-wxqc-aaxn-3ud4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:00.264997+00:00 Debian Importer Fixing VCID-q9et-b46r-nfhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:42.867932+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:19.499843+00:00 Debian Importer Fixing VCID-3r1r-24qj-zyef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:47.702483+00:00 Debian Importer Fixing VCID-7jxc-2agn-8kd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:04.753079+00:00 Debian Importer Fixing VCID-w5bc-f4gs-aqa6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:58:22.897920+00:00 Debian Importer Fixing VCID-drqw-6fx3-augx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:24.461365+00:00 Debian Importer Fixing VCID-ba9q-e289-ekbt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:20.887730+00:00 Debian Importer Fixing VCID-v71n-cp33-7uc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:16.898809+00:00 Debian Importer Fixing VCID-71pg-p4ht-pudf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:56:32.519792+00:00 Debian Importer Fixing VCID-pme4-1y6v-4ybu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:04.787101+00:00 Debian Importer Fixing VCID-y9b9-yzvm-e3df https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:01.642633+00:00 Debian Importer Fixing VCID-yhm8-zjrk-ykh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:57.935810+00:00 Debian Importer Fixing VCID-p5f7-7r1a-rycr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:44.440983+00:00 Debian Importer Fixing VCID-j79s-4ev5-jucd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:38.575823+00:00 Debian Importer Fixing VCID-9nn6-cp89-qkd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:11.926650+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:12.404296+00:00 Debian Importer Fixing VCID-5q53-gqkq-27ev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:07.623464+00:00 Debian Importer Fixing VCID-z1c6-6naw-byeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:38:49.136629+00:00 Debian Importer Fixing VCID-yycm-mx2c-tkae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:59.173646+00:00 Debian Importer Fixing VCID-egzy-8xjc-muc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:57.933922+00:00 Debian Importer Fixing VCID-7f5v-63rw-47c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:16.312424+00:00 Debian Importer Fixing VCID-4vtd-8wb9-mqg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:56.110581+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:40.447831+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:24:59.143566+00:00 Debian Importer Fixing VCID-2u2h-ryzx-wker https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:28.029265+00:00 Debian Importer Fixing VCID-yuwd-fh9w-5bc3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:44.359157+00:00 Debian Importer Fixing VCID-gn9n-bv7p-bbap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:20:02.106476+00:00 Debian Importer Fixing VCID-wbqn-8k7x-bbc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:47.022919+00:00 Debian Importer Fixing VCID-8zuq-cnzg-9bfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:04.781153+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:06.938559+00:00 Debian Importer Fixing VCID-ds17-huzd-37d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:35.517067+00:00 Debian Importer Fixing VCID-rwf4-6fjk-cqfp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:49.951963+00:00 Debian Importer Fixing VCID-pu3q-x2ey-zydp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:37.421063+00:00 Debian Importer Fixing VCID-e4sm-emrh-qkc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:10.340017+00:00 Debian Importer Fixing VCID-vemn-pw8w-y3dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:39.895501+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:44.508759+00:00 Debian Importer Fixing VCID-12eh-yc81-afaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:35.263521+00:00 Debian Importer Fixing VCID-h43t-cy2h-jfdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:30.077811+00:00 Debian Importer Fixing VCID-khyh-e434-x3hk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:06.081104+00:00 Debian Importer Fixing VCID-hkwf-9xsj-xqct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:55.806012+00:00 Debian Importer Fixing VCID-ny2r-28hp-5uep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:14.921976+00:00 Debian Importer Fixing VCID-xgjj-4vb7-uubp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:52:20.841178+00:00 Debian Importer Fixing VCID-e8zb-wjjn-ubd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:55.152309+00:00 Debian Importer Fixing VCID-73nh-61r2-4kfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:10.743901+00:00 Debian Importer Fixing VCID-ynz2-8u9q-2yba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:57.264739+00:00 Debian Importer Fixing VCID-nh84-fufj-pfgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:50.924484+00:00 Debian Importer Fixing VCID-rgst-sefy-mya3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:48.866300+00:00 Debian Importer Fixing VCID-v86n-wjus-g7h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:52.292118+00:00 Debian Importer Fixing VCID-1jmy-vuq8-8ufa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:39.508284+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:28.088404+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:33.849010+00:00 Debian Importer Fixing VCID-ausu-fn3w-kueu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:54.979480+00:00 Debian Importer Fixing VCID-qvdt-rhku-v7cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:36.357229+00:00 Debian Importer Fixing VCID-5hrv-qq76-mbcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:16.853968+00:00 Debian Importer Fixing VCID-nnye-265s-hfdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:23.354317+00:00 Debian Importer Fixing VCID-pz9s-ebvf-77c5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:00.612381+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:14.147058+00:00 Debian Importer Fixing VCID-uxqx-tssw-jqfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:39.783727+00:00 Debian Importer Fixing VCID-te26-ushn-aybj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:13:54.566549+00:00 Debian Importer Fixing VCID-5xy5-6f5d-83c7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:43.923877+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:20.399067+00:00 Debian Importer Fixing VCID-cbnj-ccs4-4uap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:00.163115+00:00 Debian Importer Fixing VCID-xuw5-8svs-p3a7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:23.383938+00:00 Debian Importer Fixing VCID-sgqw-g5s2-6ydd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:48.304669+00:00 Debian Importer Fixing VCID-pq2q-hnd2-y3eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:27.951715+00:00 Debian Importer Fixing VCID-a4us-jxhs-nfgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:28.902346+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:47.274156+00:00 Debian Importer Fixing VCID-x1ew-h8tp-67c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:32.167085+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:42.336099+00:00 Debian Importer Fixing VCID-8xen-g6z6-hfcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:10.113309+00:00 Debian Importer Fixing VCID-esdn-avz7-c3g4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:07.074749+00:00 Debian Importer Fixing VCID-w45p-1p1t-tkav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:56.769777+00:00 Debian Importer Fixing VCID-ccqg-j1n1-dqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:37:26.178402+00:00 Debian Importer Fixing VCID-3px7-6e74-cqfe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:54.136790+00:00 Debian Importer Fixing VCID-627w-z5ne-kye4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:08.361610+00:00 Debian Importer Fixing VCID-27ek-n7rv-1fdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:58.870963+00:00 Debian Importer Fixing VCID-e1ry-7wyr-z7gt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:38.741816+00:00 Debian Importer Fixing VCID-bkmk-u5ep-w3cq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:28.882597+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:21.985796+00:00 Debian Importer Fixing VCID-tbyx-yrx3-vfag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:39.252084+00:00 Debian Importer Fixing VCID-befg-btu3-g3ek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:46.200424+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:45.225732+00:00 Debian Importer Fixing VCID-euwf-e2ud-wban https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:37.933643+00:00 Debian Importer Fixing VCID-1pp7-8yu7-8kfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:08.282629+00:00 Debian Importer Fixing VCID-h4qz-m51b-5khw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:43.347201+00:00 Debian Importer Fixing VCID-7gtx-pkzb-yqcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:05.944114+00:00 Debian Importer Fixing VCID-6s39-wdz1-yuhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:41.471018+00:00 Debian Importer Fixing VCID-wkg7-9vfg-rbgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:03.150285+00:00 Debian Importer Fixing VCID-6zbf-v2qf-kudb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:38.252784+00:00 Debian Importer Fixing VCID-n5c5-p9qk-zkgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:21.106106+00:00 Debian Importer Fixing VCID-czpx-39nm-3fhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:46.604510+00:00 Debian Importer Fixing VCID-56w7-1t75-ckc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:00.926104+00:00 Debian Importer Fixing VCID-41wv-efp7-23cn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:29.274761+00:00 Debian Importer Fixing VCID-bmmz-g7bb-6ydp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:05.999950+00:00 Debian Importer Fixing VCID-jb8a-6f7d-hkas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:53.934425+00:00 Debian Importer Fixing VCID-7p7w-jwbj-guea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:49.195583+00:00 Debian Importer Fixing VCID-shpa-bmwh-yqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:14.441618+00:00 Debian Importer Fixing VCID-a4ec-hp76-rqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:08.473905+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:23.073659+00:00 Debian Importer Fixing VCID-wtnj-8rc9-tuaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:04.315136+00:00 Debian Importer Fixing VCID-hvrq-x6mt-nuad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:20.175699+00:00 Debian Importer Fixing VCID-njkh-gajt-x3cx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:02.226827+00:00 Debian Importer Fixing VCID-swsv-3s4g-kbea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:00.772250+00:00 Debian Importer Fixing VCID-aekg-54vs-6yca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:37:49.306004+00:00 Debian Importer Fixing VCID-7hzf-vk9r-dfh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:24.881942+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:20:04.645778+00:00 Debian Importer Fixing VCID-54v3-r36b-pqbt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:50.322363+00:00 Debian Importer Fixing VCID-5msy-yj5v-myc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:25.579333+00:00 Debian Importer Fixing VCID-zec6-qhn1-4qh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:17.244261+00:00 Debian Importer Fixing VCID-patn-amhm-cqcp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:11:55.744965+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:13.576074+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:03.656837+00:00 Debian Importer Fixing VCID-v386-f2n9-8ya1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:21.868611+00:00 Debian Importer Fixing VCID-5kmb-6m89-6uc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:12.631406+00:00 Debian Importer Fixing VCID-797x-2rdg-efbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:01.098529+00:00 Debian Importer Fixing VCID-2c7v-zpy1-vba9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:05:27.333114+00:00 Debian Importer Fixing VCID-uzg5-a999-afhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:05:24.664615+00:00 Debian Importer Fixing VCID-myn1-h1xa-5ba7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:06.132346+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:08.599161+00:00 Debian Importer Fixing VCID-yjkb-tsqy-uqa5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:43.887894+00:00 Debian Importer Fixing VCID-dzzp-5yb2-h7fq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:13.109165+00:00 Debian Importer Fixing VCID-avnf-p1zx-47ce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:00:55.321569+00:00 Debian Importer Fixing VCID-tqf6-xzpu-37d9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:59:22.871966+00:00 Debian Importer Fixing VCID-gmtk-srvb-byek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:59:16.034890+00:00 Debian Importer Fixing VCID-mcfw-hm7m-uuh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:47.899037+00:00 Debian Importer Fixing VCID-4b1u-hdsa-zfb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:42.096033+00:00 Debian Importer Fixing VCID-9yq7-v9ah-qyek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:43.973304+00:00 Debian Importer Fixing VCID-nuzb-2zqv-wbgf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:33.357389+00:00 Debian Importer Fixing VCID-sk4s-yzns-jfbk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:21.522213+00:00 Debian Importer Fixing VCID-2hsg-v6h9-e7er https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:11.115619+00:00 Debian Importer Fixing VCID-3wjf-z8kn-23g1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:18.336976+00:00 Debian Importer Fixing VCID-9cdv-pbch-47cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:04.612842+00:00 Debian Importer Fixing VCID-aubp-kw7t-abam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:38.503080+00:00 Debian Importer Fixing VCID-pqrq-1jus-tkep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:45:47.796191+00:00 Debian Importer Fixing VCID-fktn-5h3c-t3ay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:49.788305+00:00 Debian Importer Fixing VCID-sf7m-amp2-ebde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:47.876202+00:00 Debian Importer Fixing VCID-2gc7-kn57-b3ak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:40:20.039994+00:00 Debian Importer Fixing VCID-8bzm-ye49-w7fc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:45.735248+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:16.034562+00:00 Debian Importer Fixing VCID-5rv8-9w1a-9yag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:40.087648+00:00 Debian Importer Fixing VCID-x9x1-xeec-z7ej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:53.653107+00:00 Debian Importer Fixing VCID-tdq4-q57q-ufht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:03.964662+00:00 Debian Importer Fixing VCID-fuw5-x3dd-6yg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:53.647903+00:00 Debian Importer Fixing VCID-428v-jh9w-g3g6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:52.153299+00:00 Debian Importer Fixing VCID-wxu7-ngjj-jbac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:42.835367+00:00 Debian Importer Fixing VCID-vfpa-egy5-xfad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:39.975886+00:00 Debian Importer Fixing VCID-wqu2-yhcs-tqgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:49.991599+00:00 Debian Importer Fixing VCID-qtjk-bakx-nyar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:46.868970+00:00 Debian Importer Fixing VCID-xype-sjmg-s3gz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:37.639209+00:00 Debian Importer Fixing VCID-ak4h-uq4k-23hs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:02.787592+00:00 Debian Importer Fixing VCID-pt1y-cpch-1qfn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:51.649940+00:00 Debian Importer Fixing VCID-aupe-75b8-fbff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:44.977338+00:00 Debian Importer Fixing VCID-wxqc-aaxn-3ud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:20.493134+00:00 Debian Importer Fixing VCID-q9et-b46r-nfhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:30.740748+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:27.935544+00:00 Debian Importer Fixing VCID-3r1r-24qj-zyef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:03.180935+00:00 Debian Importer Fixing VCID-7jxc-2agn-8kd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:29.312131+00:00 Debian Importer Fixing VCID-w5bc-f4gs-aqa6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:28.529367+00:00 Debian Importer Fixing VCID-drqw-6fx3-augx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:45.307975+00:00 Debian Importer Fixing VCID-ba9q-e289-ekbt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:42.380295+00:00 Debian Importer Fixing VCID-v71n-cp33-7uc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:39.742215+00:00 Debian Importer Fixing VCID-71pg-p4ht-pudf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:05.574891+00:00 Debian Importer Fixing VCID-pme4-1y6v-4ybu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:27.287985+00:00 Debian Importer Fixing VCID-y9b9-yzvm-e3df https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:07.178048+00:00 Debian Importer Fixing VCID-yhm8-zjrk-ykh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:04.129489+00:00 Debian Importer Fixing VCID-p5f7-7r1a-rycr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:53.124135+00:00 Debian Importer Fixing VCID-j79s-4ev5-jucd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:40.065708+00:00 Debian Importer Fixing VCID-9nn6-cp89-qkd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:31.528596+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:20.777346+00:00 Debian Importer Fixing VCID-5q53-gqkq-27ev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:17.689330+00:00 Debian Importer Fixing VCID-z1c6-6naw-byeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:07.944810+00:00 Debian Importer Fixing VCID-yycm-mx2c-tkae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:40.059302+00:00 Debian Importer Fixing VCID-egzy-8xjc-muc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:38.437326+00:00 Debian Importer Fixing VCID-7f5v-63rw-47c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:10.835730+00:00 Debian Importer Fixing VCID-4vtd-8wb9-mqg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:13.412179+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:17.944187+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:46:35.727011+00:00 Debian Importer Fixing VCID-2u2h-ryzx-wker https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:28.419439+00:00 Debian Importer Fixing VCID-yuwd-fh9w-5bc3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:43:23.302736+00:00 Debian Importer Fixing VCID-gn9n-bv7p-bbap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:48.796334+00:00 Debian Importer Fixing VCID-wbqn-8k7x-bbc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:37.679945+00:00 Debian Importer Fixing VCID-8zuq-cnzg-9bfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:05.688422+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:52.873973+00:00 Debian Importer Fixing VCID-ds17-huzd-37d2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:44.952415+00:00 Debian Importer Fixing VCID-rwf4-6fjk-cqfp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:10.954189+00:00 Debian Importer Fixing VCID-pu3q-x2ey-zydp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:15.590559+00:00 Debian Importer Fixing VCID-e4sm-emrh-qkc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:14.993575+00:00 Debian Importer Fixing VCID-vemn-pw8w-y3dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:51.708432+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:57.848534+00:00 Debian Importer Fixing VCID-12eh-yc81-afaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:06.188138+00:00 Debian Importer Fixing VCID-h43t-cy2h-jfdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:02.044878+00:00 Debian Importer Fixing VCID-khyh-e434-x3hk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:50.377004+00:00 Debian Importer Fixing VCID-hkwf-9xsj-xqct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:09.625827+00:00 Debian Importer Fixing VCID-ny2r-28hp-5uep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:34.348328+00:00 Debian Importer Fixing VCID-xgjj-4vb7-uubp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:53.587294+00:00 Debian Importer Fixing VCID-e8zb-wjjn-ubd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:59.238543+00:00 Debian Importer Fixing VCID-73nh-61r2-4kfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:08.764937+00:00 Debian Importer Fixing VCID-ynz2-8u9q-2yba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:10.812112+00:00 Debian Importer Fixing VCID-nh84-fufj-pfgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:10.800526+00:00 Debian Importer Fixing VCID-rgst-sefy-mya3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:27.225851+00:00 Debian Importer Fixing VCID-v86n-wjus-g7h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:43.964452+00:00 Debian Importer Fixing VCID-1jmy-vuq8-8ufa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:15.328439+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:05.855107+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:53.613981+00:00 Debian Importer Fixing VCID-ausu-fn3w-kueu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:25.950438+00:00 Debian Importer Fixing VCID-qvdt-rhku-v7cb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:12.158772+00:00 Debian Importer Fixing VCID-5hrv-qq76-mbcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:24.540865+00:00 Debian Importer Fixing VCID-nnye-265s-hfdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:55.974033+00:00 Debian Importer Fixing VCID-pz9s-ebvf-77c5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:07.897154+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:30.584537+00:00 Debian Importer Fixing VCID-uxqx-tssw-jqfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:19.526808+00:00 Debian Importer Fixing VCID-te26-ushn-aybj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:52:46.939015+00:00 Debian Importer Fixing VCID-5xy5-6f5d-83c7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:22.538067+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:13.869240+00:00 Debian Importer Fixing VCID-cbnj-ccs4-4uap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:59.029738+00:00 Debian Importer Fixing VCID-xuw5-8svs-p3a7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:29.766025+00:00 Debian Importer Fixing VCID-sgqw-g5s2-6ydd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:59.550703+00:00 Debian Importer Fixing VCID-pq2q-hnd2-y3eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:42.716168+00:00 Debian Importer Fixing VCID-a4us-jxhs-nfgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:24.347342+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:49.612132+00:00 Debian Importer Fixing VCID-x1ew-h8tp-67c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:04.727444+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:37.235488+00:00 Debian Importer Fixing VCID-8xen-g6z6-hfcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:40.357218+00:00 Debian Importer Fixing VCID-esdn-avz7-c3g4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:38.668208+00:00 Debian Importer Fixing VCID-w45p-1p1t-tkav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:28.553017+00:00 Debian Importer Fixing VCID-ccqg-j1n1-dqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:22.867575+00:00 Debian Importer Fixing VCID-3px7-6e74-cqfe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:25.415139+00:00 Debian Importer Fixing VCID-627w-z5ne-kye4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:27.741797+00:00 Debian Importer Fixing VCID-27ek-n7rv-1fdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:15.837151+00:00 Debian Importer Fixing VCID-e1ry-7wyr-z7gt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:43.679657+00:00 Debian Importer Fixing VCID-bkmk-u5ep-w3cq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:37.635512+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:33.291559+00:00 Debian Importer Fixing VCID-tbyx-yrx3-vfag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:31.428202+00:00 Debian Importer Fixing VCID-befg-btu3-g3ek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:58.586075+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:41.480882+00:00 Debian Importer Fixing VCID-euwf-e2ud-wban https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:00.057683+00:00 Debian Importer Fixing VCID-1pp7-8yu7-8kfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:37.714436+00:00 Debian Importer Fixing VCID-h4qz-m51b-5khw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:22.585554+00:00 Debian Importer Fixing VCID-7gtx-pkzb-yqcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:37.867237+00:00 Debian Importer Fixing VCID-6s39-wdz1-yuhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:36.394374+00:00 Debian Importer Fixing VCID-wkg7-9vfg-rbgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:26.422370+00:00 Debian Importer Fixing VCID-6zbf-v2qf-kudb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:52.336757+00:00 Debian Importer Fixing VCID-n5c5-p9qk-zkgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:42.261543+00:00 Debian Importer Fixing VCID-czpx-39nm-3fhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:22.174535+00:00 Debian Importer Fixing VCID-56w7-1t75-ckc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:54.763996+00:00 Debian Importer Fixing VCID-41wv-efp7-23cn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:00.081101+00:00 Debian Importer Fixing VCID-bmmz-g7bb-6ydp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:44.442625+00:00 Debian Importer Fixing VCID-jb8a-6f7d-hkas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:38.224686+00:00 Debian Importer Fixing VCID-7p7w-jwbj-guea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:17.416094+00:00 Debian Importer Fixing VCID-shpa-bmwh-yqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:29.477759+00:00 Debian Importer Fixing VCID-a4ec-hp76-rqcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:49.001489+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:16.418036+00:00 Debian Importer Fixing VCID-wtnj-8rc9-tuaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:34.561812+00:00 Debian Importer Fixing VCID-hvrq-x6mt-nuad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:07.474253+00:00 Debian Importer Fixing VCID-njkh-gajt-x3cx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:57.423014+00:00 Debian Importer Fixing VCID-swsv-3s4g-kbea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:20.989907+00:00 Debian Importer Fixing VCID-aekg-54vs-6yca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:14.709602+00:00 Debian Importer Fixing VCID-7hzf-vk9r-dfh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:43.098821+00:00 Debian Importer Fixing VCID-jb8a-6f7d-hkas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.081582+00:00 Debian Importer Fixing VCID-wxu7-ngjj-jbac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.057839+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.036887+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.016136+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.992868+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.970722+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.946464+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.921992+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.897833+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.873834+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.850016+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.825992+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.802348+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.777705+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.753295+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.725984+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.700886+00:00 Debian Importer Fixing VCID-pu3q-x2ey-zydp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.677063+00:00 Debian Importer Fixing VCID-nnye-265s-hfdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.656381+00:00 Debian Importer Fixing VCID-pq2q-hnd2-y3eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.635695+00:00 Debian Importer Fixing VCID-te26-ushn-aybj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.613715+00:00 Debian Importer Fixing VCID-q9et-b46r-nfhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.591144+00:00 Debian Importer Fixing VCID-ny2r-28hp-5uep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.566219+00:00 Debian Importer Fixing VCID-wkg7-9vfg-rbgc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.541467+00:00 Debian Importer Fixing VCID-9yq7-v9ah-qyek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.517464+00:00 Debian Importer Fixing VCID-bmmz-g7bb-6ydp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.492585+00:00 Debian Importer Fixing VCID-9cdv-pbch-47cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.467640+00:00 Debian Importer Fixing VCID-v86n-wjus-g7h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.443221+00:00 Debian Importer Fixing VCID-euwf-e2ud-wban https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.418248+00:00 Debian Importer Fixing VCID-patn-amhm-cqcp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.394786+00:00 Debian Importer Fixing VCID-sgqw-g5s2-6ydd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.373171+00:00 Debian Importer Fixing VCID-sk4s-yzns-jfbk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.348669+00:00 Debian Importer Fixing VCID-w45p-1p1t-tkav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.325140+00:00 Debian Importer Fixing VCID-xgjj-4vb7-uubp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.301891+00:00 Debian Importer Fixing VCID-dzzp-5yb2-h7fq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.281695+00:00 Debian Importer Fixing VCID-5kmb-6m89-6uc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.261364+00:00 Debian Importer Fixing VCID-2hsg-v6h9-e7er https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.241113+00:00 Debian Importer Fixing VCID-7jxc-2agn-8kd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.220541+00:00 Debian Importer Fixing VCID-xuw5-8svs-p3a7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.200235+00:00 Debian Importer Fixing VCID-ccqg-j1n1-dqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.178333+00:00 Debian Importer Fixing VCID-x1ew-h8tp-67c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.152043+00:00 Debian Importer Fixing VCID-yycm-mx2c-tkae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.128332+00:00 Debian Importer Fixing VCID-tdq4-q57q-ufht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.104782+00:00 Debian Importer Fixing VCID-8xen-g6z6-hfcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.078460+00:00 Debian Importer Fixing VCID-z1c6-6naw-byeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.052104+00:00 Debian Importer Fixing VCID-tqf6-xzpu-37d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.028808+00:00 Debian Importer Fixing VCID-aupe-75b8-fbff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.005301+00:00 Debian Importer Fixing VCID-hkwf-9xsj-xqct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.981680+00:00 Debian Importer Fixing VCID-y9b9-yzvm-e3df https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.958001+00:00 Debian Importer Fixing VCID-n5c5-p9qk-zkgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.934057+00:00 Debian Importer Fixing VCID-5xy5-6f5d-83c7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.910297+00:00 Debian Importer Fixing VCID-6zbf-v2qf-kudb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.886125+00:00 Debian Importer Fixing VCID-5rv8-9w1a-9yag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.862278+00:00 Debian Importer Fixing VCID-nuzb-2zqv-wbgf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.838445+00:00 Debian Importer Fixing VCID-7hzf-vk9r-dfh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.814592+00:00 Debian Importer Fixing VCID-tbyx-yrx3-vfag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.790961+00:00 Debian Importer Fixing VCID-pt1y-cpch-1qfn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.767194+00:00 Debian Importer Fixing VCID-w5bc-f4gs-aqa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.743782+00:00 Debian Importer Fixing VCID-e4sm-emrh-qkc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.720062+00:00 Debian Importer Fixing VCID-h43t-cy2h-jfdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.696730+00:00 Debian Importer Fixing VCID-e1ry-7wyr-z7gt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.672983+00:00 Debian Importer Fixing VCID-rgst-sefy-mya3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.649116+00:00 Debian Importer Fixing VCID-aubp-kw7t-abam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.625413+00:00 Debian Importer Fixing VCID-1jmy-vuq8-8ufa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.601787+00:00 Debian Importer Fixing VCID-v71n-cp33-7uc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.578126+00:00 Debian Importer Fixing VCID-drqw-6fx3-augx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.554791+00:00 Debian Importer Fixing VCID-nh84-fufj-pfgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.531293+00:00 Debian Importer Fixing VCID-fktn-5h3c-t3ay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.507597+00:00 Debian Importer Fixing VCID-ynz2-8u9q-2yba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.483972+00:00 Debian Importer Fixing VCID-ds17-huzd-37d2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.460425+00:00 Debian Importer Fixing VCID-befg-btu3-g3ek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.437095+00:00 Debian Importer Fixing VCID-gn9n-bv7p-bbap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.413483+00:00 Debian Importer Fixing VCID-zec6-qhn1-4qh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.389438+00:00 Debian Importer Fixing VCID-p5f7-7r1a-rycr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.366014+00:00 Debian Importer Fixing VCID-khyh-e434-x3hk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.343202+00:00 Debian Importer Fixing VCID-esdn-avz7-c3g4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.318606+00:00 Debian Importer Fixing VCID-7f5v-63rw-47c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.294969+00:00 Debian Importer Fixing VCID-czpx-39nm-3fhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.270215+00:00 Debian Importer Fixing VCID-8zuq-cnzg-9bfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.246997+00:00 Debian Importer Fixing VCID-pme4-1y6v-4ybu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.225063+00:00 Debian Importer Fixing VCID-wxqc-aaxn-3ud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.201669+00:00 Debian Importer Fixing VCID-yuwd-fh9w-5bc3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.180329+00:00 Debian Importer Fixing VCID-avnf-p1zx-47ce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.159906+00:00 Debian Importer Fixing VCID-71pg-p4ht-pudf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.139489+00:00 Debian Importer Fixing VCID-yhm8-zjrk-ykh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.118786+00:00 Debian Importer Fixing VCID-swsv-3s4g-kbea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.098460+00:00 Debian Importer Fixing VCID-cbnj-ccs4-4uap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.077696+00:00 Debian Importer Fixing VCID-e8zb-wjjn-ubd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.055081+00:00 Debian Importer Fixing VCID-wtnj-8rc9-tuaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.032968+00:00 Debian Importer Fixing VCID-6s39-wdz1-yuhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:41.007160+00:00 Debian Importer Fixing VCID-797x-2rdg-efbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.983875+00:00 Debian Importer Fixing VCID-3r1r-24qj-zyef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.961097+00:00 Debian Importer Fixing VCID-xype-sjmg-s3gz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.936520+00:00 Debian Importer Fixing VCID-3px7-6e74-cqfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.910410+00:00 Debian Importer Fixing VCID-7gtx-pkzb-yqcz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.885857+00:00 Debian Importer Fixing VCID-ba9q-e289-ekbt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.859866+00:00 Debian Importer Fixing VCID-3wjf-z8kn-23g1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.835434+00:00 Debian Importer Fixing VCID-aekg-54vs-6yca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.811027+00:00 Debian Importer Fixing VCID-uxqx-tssw-jqfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.786378+00:00 Debian Importer Fixing VCID-egzy-8xjc-muc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.763303+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.743034+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.721645+00:00 Debian Importer Fixing VCID-ak4h-uq4k-23hs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.699680+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.676721+00:00 Debian Importer Fixing VCID-5msy-yj5v-myc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.653961+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.629898+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.606962+00:00 Debian Importer Fixing VCID-rwf4-6fjk-cqfp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.585755+00:00 Debian Importer Fixing VCID-73nh-61r2-4kfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.564669+00:00 Debian Importer Fixing VCID-shpa-bmwh-yqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.543472+00:00 Debian Importer Fixing VCID-9nn6-cp89-qkd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.519206+00:00 Debian Importer Fixing VCID-5q53-gqkq-27ev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.493839+00:00 Debian Importer Fixing VCID-vfpa-egy5-xfad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.469411+00:00 Debian Importer Fixing VCID-1pp7-8yu7-8kfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.445026+00:00 Debian Importer Fixing VCID-gmtk-srvb-byek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.419160+00:00 Debian Importer Fixing VCID-njkh-gajt-x3cx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.395903+00:00 Debian Importer Fixing VCID-vemn-pw8w-y3dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.375329+00:00 Debian Importer Fixing VCID-fuw5-x3dd-6yg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.354688+00:00 Debian Importer Fixing VCID-54v3-r36b-pqbt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.334590+00:00 Debian Importer Fixing VCID-627w-z5ne-kye4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.314455+00:00 Debian Importer Fixing VCID-myn1-h1xa-5ba7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.294348+00:00 Debian Importer Fixing VCID-ausu-fn3w-kueu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.274177+00:00 Debian Importer Fixing VCID-2gc7-kn57-b3ak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.254097+00:00 Debian Importer Fixing VCID-sf7m-amp2-ebde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.234145+00:00 Debian Importer Fixing VCID-qvdt-rhku-v7cb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.213842+00:00 Debian Importer Fixing VCID-a4us-jxhs-nfgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.192016+00:00 Debian Importer Fixing VCID-bkmk-u5ep-w3cq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.167260+00:00 Debian Importer Fixing VCID-mcfw-hm7m-uuh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.142357+00:00 Debian Importer Fixing VCID-2u2h-ryzx-wker https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.117714+00:00 Debian Importer Fixing VCID-428v-jh9w-g3g6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.093334+00:00 Debian Importer Fixing VCID-27ek-n7rv-1fdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.068633+00:00 Debian Importer Fixing VCID-wbqn-8k7x-bbc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.043682+00:00 Debian Importer Fixing VCID-a4ec-hp76-rqcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.018182+00:00 Debian Importer Fixing VCID-4vtd-8wb9-mqg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.995165+00:00 Debian Importer Fixing VCID-56w7-1t75-ckc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.975207+00:00 Debian Importer Fixing VCID-j79s-4ev5-jucd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.954076+00:00 Debian Importer Fixing VCID-yjkb-tsqy-uqa5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.932447+00:00 Debian Importer Fixing VCID-2c7v-zpy1-vba9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.907700+00:00 Debian Importer Fixing VCID-12eh-yc81-afaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.883190+00:00 Debian Importer Fixing VCID-5hrv-qq76-mbcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.857301+00:00 Debian Importer Fixing VCID-v386-f2n9-8ya1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.831300+00:00 Debian Importer Fixing VCID-4b1u-hdsa-zfb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.805652+00:00 Debian Importer Fixing VCID-h4qz-m51b-5khw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.781004+00:00 Debian Importer Fixing VCID-hvrq-x6mt-nuad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.756559+00:00 Debian Importer Fixing VCID-7p7w-jwbj-guea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.731898+00:00 Debian Importer Fixing VCID-pqrq-1jus-tkep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.706645+00:00 Debian Importer Fixing VCID-41wv-efp7-23cn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.682015+00:00 Debian Importer Fixing VCID-wqu2-yhcs-tqgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.657395+00:00 Debian Importer Fixing VCID-x9x1-xeec-z7ej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.632597+00:00 Debian Importer Fixing VCID-8bzm-ye49-w7fc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.607030+00:00 Debian Importer Fixing VCID-qtjk-bakx-nyar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.581468+00:00 Debian Importer Fixing VCID-pz9s-ebvf-77c5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:39.555885+00:00 Debian Importer Fixing VCID-uzg5-a999-afhp https://security-tracker.debian.org/tracker/data/json 38.1.0