Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rubygems@1.8.24-1
purl pkg:deb/debian/rubygems@1.8.24-1
Next non-vulnerable version 3.3.15-2+deb12u1
Latest non-vulnerable version 3.3.15-2+deb12u1
Risk 10.0
Vulnerabilities affecting this package (23)
Vulnerability Summary Fixed by
VCID-8d7n-bfhu-dkfd
Aliases:
CVE-2018-1000075
GHSA-74pv-v9gh-h25p
Loop with Unreachable Exit Condition (Infinite Loop) RubyGems contains an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-8hm4-c4w4-gfen
Aliases:
CVE-2018-1000078
GHSA-87qx-g5wg-mwmj
Cross-site Scripting RubyGems contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appears to be exploitable by the victim browsing to a malicious gem on a vulnerable gem server.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-9t45-d5mf-3uar
Aliases:
CVE-2018-1000079
GHSA-8qxg-mff5-j3wc
Path Traversal RubyGems contains a Directory Traversal vulnerability in gem installation that can result in the gem being able to write to arbitrary filesystem locations during installation. This attack appears to be exploitable by a victim installing a malicious gem.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-af1f-xwwy-jfa8
Aliases:
CVE-2018-1000074
GHSA-qj2w-mw2r-pv39
RubyGems contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appears to be exploitable when the victim runs the `gem owner` command on a gem with a specially crafted YAML file.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-b36p-re17-n7dq
Aliases:
CVE-2017-0900
GHSA-p7f2-rr42-m9xm
Improper Input Validation RubyGems is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-cde2-rv4n-tkau
Aliases:
CVE-2017-0903
GHSA-mqwr-4qf2-2hcv
Deserialization of Untrusted Data rubygems-update is vulnerable to a remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-f7x5-hz5f-hyd3
Aliases:
CVE-2019-8325
GHSA-4wm8-fjv7-j774
Improper Restriction of Operations within the Bounds of a Memory Buffer An issue was discovered in RubyGems. Since `Gem::CommandManager#run` calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-ha3g-uyse-wybx
Aliases:
CVE-2019-8322
GHSA-mh37-8c3g-3fgc
Injection Vulnerability An issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-jkwe-c323-3yez
Aliases:
CVE-2019-8321
GHSA-fr32-gr5c-xq5c
Argument Injection or Modification An issue was discovered in RubyGems. Since `Gem::UserInteraction#verbose` calls say without escaping, escape sequence injection is possible.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-jmzh-89dm-r7g2
Aliases:
CVE-2017-0902
GHSA-73w7-6w9g-gc8w
Origin Validation Error RubyGems is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-k2ga-fgvp-5qc7
Aliases:
CVE-2013-4287
GHSA-9j7m-rjqx-48vh
OSV-97163
Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-ky5r-bch5-m7dv
Aliases:
CVE-2019-8323
GHSA-3h4r-pjv6-cph9
Injection Vulnerability An issue was discovered in RubyGems. `Gem::GemcutterUtilities#with_response` may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-mamm-cvdr-subf
Aliases:
CVE-2018-1000077
GHSA-gv86-43rv-79m2
RubyGems contains an Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem being able to set an invalid homepage URL.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-n1ja-n53g-fycm
Aliases:
CVE-2025-27221
GHSA-22h5-pq3x-2gf2
URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability.
3.3.15-2+deb12u1
Affected by 0 other vulnerabilities.
VCID-t78a-dw4s-vqf5
Aliases:
CVE-2019-8320
GHSA-5x32-c9mf-49cc
Path Traversal A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (`/tmp`, `/usr`, etc.), this could likely lead to data loss or an unusable system.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-tq93-h2ag-s3bx
Aliases:
CVE-2018-1000073
GHSA-gx69-6cp4-hxrj
Path Traversal RubyGems contains a Directory Traversal vulnerability in install_location function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside the root.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-ucdh-7fgy-33h8
Aliases:
CVE-2013-4363
GHSA-9qvm-2vhf-q649
Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-uxdx-abx7-fkdy
Aliases:
CVE-2023-28755
GHSA-hv5j-3h9f-99c2
Ruby URI component ReDoS issue A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
3.3.15-2+deb12u1
Affected by 0 other vulnerabilities.
VCID-w4ns-f42m-pyec
Aliases:
CVE-2018-1000076
GHSA-mc6j-h948-v2p6
RubyGems contains an Improper Verification of Cryptographic Signature vulnerability in `package.rb` that can result in a mis-signed gem being installed, as the tarball would contain multiple gem signatures.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-xbrw-47yv-wqcr
Aliases:
CVE-2021-43809
GHSA-fj7f-vq84-fh43
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.
3.3.15-2+deb12u1
Affected by 0 other vulnerabilities.
VCID-xgmc-a5rk-zqag
Aliases:
CVE-2019-8324
GHSA-76wm-422q-92mq
Improper Input Validation A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is evaluated by `ensure_loadable_spec` during the pre-installation check.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-xgsa-5umz-qffr
Aliases:
CVE-2017-0899
GHSA-7gcp-2gmq-w3xh
Code Injection RubyGems is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
3.2.5-2
Affected by 4 other vulnerabilities.
VCID-xz68-vwz2-2ke4
Aliases:
CVE-2017-0901
GHSA-pm9x-4392-2c2p
Improper Input Validation RubyGems fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
3.2.5-2
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T00:46:23.531755+00:00 Debian Oval Importer Affected by VCID-9t45-d5mf-3uar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:30:02.526622+00:00 Debian Oval Importer Affected by VCID-xbrw-47yv-wqcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:34:32.140471+00:00 Debian Oval Importer Affected by VCID-jmzh-89dm-r7g2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:51:35.975703+00:00 Debian Oval Importer Affected by VCID-xz68-vwz2-2ke4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:43:01.907636+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:22:53.836200+00:00 Debian Oval Importer Affected by VCID-mamm-cvdr-subf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:52:35.571448+00:00 Debian Oval Importer Affected by VCID-t78a-dw4s-vqf5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:17:03.409806+00:00 Debian Oval Importer Affected by VCID-ha3g-uyse-wybx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:14:25.566333+00:00 Debian Oval Importer Affected by VCID-jkwe-c323-3yez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:12:16.191408+00:00 Debian Oval Importer Affected by VCID-8hm4-c4w4-gfen https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:10:29.835010+00:00 Debian Oval Importer Affected by VCID-cde2-rv4n-tkau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:01:19.161826+00:00 Debian Oval Importer Affected by VCID-w4ns-f42m-pyec https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:44:17.555957+00:00 Debian Oval Importer Affected by VCID-tq93-h2ag-s3bx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:12:39.702958+00:00 Debian Oval Importer Affected by VCID-ucdh-7fgy-33h8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:38:21.149945+00:00 Debian Oval Importer Affected by VCID-k2ga-fgvp-5qc7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:23:59.871528+00:00 Debian Oval Importer Affected by VCID-ky5r-bch5-m7dv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:19:18.792439+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:17:59.849452+00:00 Debian Oval Importer Affected by VCID-f7x5-hz5f-hyd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:12:00.484134+00:00 Debian Oval Importer Affected by VCID-b36p-re17-n7dq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:08:08.624938+00:00 Debian Oval Importer Affected by VCID-af1f-xwwy-jfa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:02:28.226179+00:00 Debian Oval Importer Affected by VCID-8d7n-bfhu-dkfd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:00:57.961791+00:00 Debian Oval Importer Affected by VCID-xgmc-a5rk-zqag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:51:07.157375+00:00 Debian Oval Importer Affected by VCID-xgsa-5umz-qffr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-12T00:18:57.234712+00:00 Debian Oval Importer Affected by VCID-9t45-d5mf-3uar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:03:22.127296+00:00 Debian Oval Importer Affected by VCID-xbrw-47yv-wqcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:09:32.015940+00:00 Debian Oval Importer Affected by VCID-jmzh-89dm-r7g2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:30:06.161901+00:00 Debian Oval Importer Affected by VCID-xz68-vwz2-2ke4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:21:46.141779+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:02:22.910971+00:00 Debian Oval Importer Affected by VCID-mamm-cvdr-subf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:33:11.402330+00:00 Debian Oval Importer Affected by VCID-t78a-dw4s-vqf5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:58:49.106462+00:00 Debian Oval Importer Affected by VCID-ha3g-uyse-wybx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:57:57.768720+00:00 Debian Oval Importer Affected by VCID-jkwe-c323-3yez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:55:52.453546+00:00 Debian Oval Importer Affected by VCID-8hm4-c4w4-gfen https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:54:09.741642+00:00 Debian Oval Importer Affected by VCID-cde2-rv4n-tkau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:45:23.652504+00:00 Debian Oval Importer Affected by VCID-w4ns-f42m-pyec https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:29:08.233054+00:00 Debian Oval Importer Affected by VCID-tq93-h2ag-s3bx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:58:06.598209+00:00 Debian Oval Importer Affected by VCID-ucdh-7fgy-33h8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:24:33.745386+00:00 Debian Oval Importer Affected by VCID-k2ga-fgvp-5qc7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:10:24.296364+00:00 Debian Oval Importer Affected by VCID-ky5r-bch5-m7dv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:05:47.434572+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:04:30.640238+00:00 Debian Oval Importer Affected by VCID-f7x5-hz5f-hyd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:58:34.633659+00:00 Debian Oval Importer Affected by VCID-b36p-re17-n7dq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:54:43.541902+00:00 Debian Oval Importer Affected by VCID-af1f-xwwy-jfa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:49:02.340164+00:00 Debian Oval Importer Affected by VCID-8d7n-bfhu-dkfd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:47:33.391607+00:00 Debian Oval Importer Affected by VCID-xgmc-a5rk-zqag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:38:46.670948+00:00 Debian Oval Importer Affected by VCID-xgsa-5umz-qffr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:49:48.656304+00:00 Debian Oval Importer Affected by VCID-9t45-d5mf-3uar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:34:42.262774+00:00 Debian Oval Importer Affected by VCID-xbrw-47yv-wqcr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:43:15.203482+00:00 Debian Oval Importer Affected by VCID-jmzh-89dm-r7g2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:08:26.404611+00:00 Debian Oval Importer Affected by VCID-xz68-vwz2-2ke4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:00:26.365843+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:41:38.956075+00:00 Debian Oval Importer Affected by VCID-mamm-cvdr-subf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:13:22.344162+00:00 Debian Oval Importer Affected by VCID-t78a-dw4s-vqf5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:40:37.639119+00:00 Debian Oval Importer Affected by VCID-ha3g-uyse-wybx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:42:33.070052+00:00 Debian Oval Importer Affected by VCID-jkwe-c323-3yez https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:40:31.049915+00:00 Debian Oval Importer Affected by VCID-8hm4-c4w4-gfen https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:38:52.184612+00:00 Debian Oval Importer Affected by VCID-cde2-rv4n-tkau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:30:26.308227+00:00 Debian Oval Importer Affected by VCID-w4ns-f42m-pyec https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:14:23.067755+00:00 Debian Oval Importer Affected by VCID-tq93-h2ag-s3bx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:44:51.850707+00:00 Debian Oval Importer Affected by VCID-ucdh-7fgy-33h8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:12:46.121828+00:00 Debian Oval Importer Affected by VCID-k2ga-fgvp-5qc7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:59:26.651745+00:00 Debian Oval Importer Affected by VCID-ky5r-bch5-m7dv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:55:02.693179+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:53:49.479246+00:00 Debian Oval Importer Affected by VCID-f7x5-hz5f-hyd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:48:09.098590+00:00 Debian Oval Importer Affected by VCID-b36p-re17-n7dq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:44:29.841909+00:00 Debian Oval Importer Affected by VCID-af1f-xwwy-jfa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:39:11.918230+00:00 Debian Oval Importer Affected by VCID-8d7n-bfhu-dkfd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:37:48.870393+00:00 Debian Oval Importer Affected by VCID-xgmc-a5rk-zqag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:32:43.329862+00:00 Debian Oval Importer Affected by VCID-xgsa-5umz-qffr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0