Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rubygems@3.6.7-2?distro=trixie
purl pkg:deb/debian/rubygems@3.6.7-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (29)
Vulnerability Summary Aliases
VCID-8d7n-bfhu-dkfd Loop with Unreachable Exit Condition (Infinite Loop) RubyGems contains an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop. CVE-2018-1000075
GHSA-74pv-v9gh-h25p
VCID-8hm4-c4w4-gfen Cross-site Scripting RubyGems contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appears to be exploitable by the victim browsing to a malicious gem on a vulnerable gem server. CVE-2018-1000078
GHSA-87qx-g5wg-mwmj
VCID-9t45-d5mf-3uar Path Traversal RubyGems contains a Directory Traversal vulnerability in gem installation that can result in the gem being able to write to arbitrary filesystem locations during installation. This attack appears to be exploitable by a victim installing a malicious gem. CVE-2018-1000079
GHSA-8qxg-mff5-j3wc
VCID-af1f-xwwy-jfa8 RubyGems contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appears to be exploitable when the victim runs the `gem owner` command on a gem with a specially crafted YAML file. CVE-2018-1000074
GHSA-qj2w-mw2r-pv39
VCID-ajtx-8w3u-rkae URI gem has ReDoS vulnerability A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile. CVE-2023-36617
GHSA-hww2-5g85-429m
VCID-b36p-re17-n7dq Improper Input Validation RubyGems is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command. CVE-2017-0900
GHSA-p7f2-rr42-m9xm
VCID-cde2-rv4n-tkau Deserialization of Untrusted Data rubygems-update is vulnerable to a remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. CVE-2017-0903
GHSA-mqwr-4qf2-2hcv
VCID-dy2a-n93k-yfgd Dependency Confusion in Bundler Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. CVE-2020-36327
GHSA-fp4w-jxhp-m23p
VCID-ee8m-jtmh-dfbs 7PK - Security Features RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack." CVE-2015-3900
GHSA-wp3j-rvfp-624h
OSV-122162
VCID-f7x5-hz5f-hyd3 Improper Restriction of Operations within the Bounds of a Memory Buffer An issue was discovered in RubyGems. Since `Gem::CommandManager#run` calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) CVE-2019-8325
GHSA-4wm8-fjv7-j774
VCID-fx2c-u8eb-dufe HTTP Request Smuggling RubyGems can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack. CVE-2012-2125
GHSA-228f-g3h7-3fj3
OSV-85809
VCID-ha3g-uyse-wybx Injection Vulnerability An issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. CVE-2019-8322
GHSA-mh37-8c3g-3fgc
VCID-hpng-v58x-xua5 Cryptographic Issues RubyGems does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack. CVE-2012-2126
GHSA-5mgj-mvv8-46mw
OSV-81444
VCID-jkwe-c323-3yez Argument Injection or Modification An issue was discovered in RubyGems. Since `Gem::UserInteraction#verbose` calls say without escaping, escape sequence injection is possible. CVE-2019-8321
GHSA-fr32-gr5c-xq5c
VCID-jmzh-89dm-r7g2 Origin Validation Error RubyGems is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls. CVE-2017-0902
GHSA-73w7-6w9g-gc8w
VCID-k2ga-fgvp-5qc7 Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. CVE-2013-4287
GHSA-9j7m-rjqx-48vh
OSV-97163
VCID-ky5r-bch5-m7dv Injection Vulnerability An issue was discovered in RubyGems. `Gem::GemcutterUtilities#with_response` may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. CVE-2019-8323
GHSA-3h4r-pjv6-cph9
VCID-mamm-cvdr-subf RubyGems contains an Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem being able to set an invalid homepage URL. CVE-2018-1000077
GHSA-gv86-43rv-79m2
VCID-n1ja-n53g-fycm URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability. CVE-2025-27221
GHSA-22h5-pq3x-2gf2
VCID-t78a-dw4s-vqf5 Path Traversal A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (`/tmp`, `/usr`, etc.), this could likely lead to data loss or an unusable system. CVE-2019-8320
GHSA-5x32-c9mf-49cc
VCID-tq93-h2ag-s3bx Path Traversal RubyGems contains a Directory Traversal vulnerability in install_location function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside the root. CVE-2018-1000073
GHSA-gx69-6cp4-hxrj
VCID-ucdh-7fgy-33h8 Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. CVE-2013-4363
GHSA-9qvm-2vhf-q649
VCID-uxdx-abx7-fkdy Ruby URI component ReDoS issue A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1. CVE-2023-28755
GHSA-hv5j-3h9f-99c2
VCID-w4ns-f42m-pyec RubyGems contains an Improper Verification of Cryptographic Signature vulnerability in `package.rb` that can result in a mis-signed gem being installed, as the tarball would contain multiple gem signatures. CVE-2018-1000076
GHSA-mc6j-h948-v2p6
VCID-xbrw-47yv-wqcr Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. CVE-2021-43809
GHSA-fj7f-vq84-fh43
VCID-xgmc-a5rk-zqag Improper Input Validation A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is evaluated by `ensure_loadable_spec` during the pre-installation check. CVE-2019-8324
GHSA-76wm-422q-92mq
VCID-xgsa-5umz-qffr Code Injection RubyGems is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences. CVE-2017-0899
GHSA-7gcp-2gmq-w3xh
VCID-xz68-vwz2-2ke4 Improper Input Validation RubyGems fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem. CVE-2017-0901
GHSA-pm9x-4392-2c2p
VCID-zb9m-getz-3keh Improper Input Validation RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900. CVE-2015-4020
GHSA-qv62-xfj6-32xm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:31:50.914857+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:24.253882+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:13:59.470874+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:54:07.340566+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:32:55.082288+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:33.890284+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:25:45.508861+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:33.943253+00:00 Debian Importer Fixing VCID-jmzh-89dm-r7g2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:08.096064+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:13.888342+00:00 Debian Importer Fixing VCID-xgsa-5umz-qffr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:39.461543+00:00 Debian Importer Fixing VCID-uxdx-abx7-fkdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:24.098184+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:25.336564+00:00 Debian Importer Fixing VCID-xbrw-47yv-wqcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:24.843033+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:14.028711+00:00 Debian Importer Fixing VCID-ucdh-7fgy-33h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:27.098299+00:00 Debian Importer Fixing VCID-xz68-vwz2-2ke4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:40.431759+00:00 Debian Importer Fixing VCID-b36p-re17-n7dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:31.662813+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:14:52.992619+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:10.432363+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:43.868068+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:45.689615+00:00 Debian Importer Fixing VCID-fx2c-u8eb-dufe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:48.077638+00:00 Debian Importer Fixing VCID-cde2-rv4n-tkau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:59.226486+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:52.416940+00:00 Debian Importer Fixing VCID-hpng-v58x-xua5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:21.537446+00:00 Debian Importer Fixing VCID-k2ga-fgvp-5qc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:15.142393+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:56.062622+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:23.322557+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:26.489921+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:06:39.059765+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:29.119073+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:38.922831+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:27.121382+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:27.119103+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:53.120829+00:00 Debian Importer Fixing VCID-jmzh-89dm-r7g2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:32.494628+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:29.294782+00:00 Debian Importer Fixing VCID-xgsa-5umz-qffr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:51.336278+00:00 Debian Importer Fixing VCID-uxdx-abx7-fkdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:38.897666+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:05.923125+00:00 Debian Importer Fixing VCID-xbrw-47yv-wqcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:32.696922+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:11.016410+00:00 Debian Importer Fixing VCID-ucdh-7fgy-33h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:32.041632+00:00 Debian Importer Fixing VCID-xz68-vwz2-2ke4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:31.123376+00:00 Debian Importer Fixing VCID-b36p-re17-n7dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:18.086010+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:53:31.004164+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:58.250116+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:18.633709+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:51.934197+00:00 Debian Importer Fixing VCID-fx2c-u8eb-dufe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:55.146640+00:00 Debian Importer Fixing VCID-cde2-rv4n-tkau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:06.531249+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:20.287409+00:00 Debian Importer Fixing VCID-hpng-v58x-xua5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:33.217439+00:00 Debian Importer Fixing VCID-k2ga-fgvp-5qc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:56.257829+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:29.876284+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:26.666012+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.631379+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.588668+00:00 Debian Importer Fixing VCID-uxdx-abx7-fkdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.554366+00:00 Debian Importer Fixing VCID-xbrw-47yv-wqcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.512165+00:00 Debian Importer Fixing VCID-dy2a-n93k-yfgd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.473722+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.439538+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.406172+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.372778+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.338353+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.303695+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.268963+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.234483+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.199561+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.165306+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.130934+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.096131+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.061597+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:26.027531+00:00 Debian Importer Fixing VCID-cde2-rv4n-tkau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.993975+00:00 Debian Importer Fixing VCID-jmzh-89dm-r7g2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.959667+00:00 Debian Importer Fixing VCID-xz68-vwz2-2ke4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.925551+00:00 Debian Importer Fixing VCID-b36p-re17-n7dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.869441+00:00 Debian Importer Fixing VCID-xgsa-5umz-qffr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.833454+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.799147+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.763725+00:00 Debian Importer Fixing VCID-ucdh-7fgy-33h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.723891+00:00 Debian Importer Fixing VCID-k2ga-fgvp-5qc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.680989+00:00 Debian Importer Fixing VCID-hpng-v58x-xua5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.641025+00:00 Debian Importer Fixing VCID-fx2c-u8eb-dufe https://security-tracker.debian.org/tracker/data/json 38.1.0