Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat9@9.0.70-2
purl pkg:deb/debian/tomcat9@9.0.70-2
Next non-vulnerable version 9.0.115-1
Latest non-vulnerable version 9.0.115-1
Risk 10.0
Vulnerabilities affecting this package (14)
Vulnerability Summary Fixed by
VCID-246u-a4rh-yyd4
Aliases:
CVE-2025-49125
GHSA-wc4r-xq3c-5cf3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-2x6a-3gh1-rkhs
Aliases:
CVE-2025-48976
GHSA-vv7r-c36w-3prj
Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-2zq1-na8s-mfdd
Aliases:
CVE-2025-31650
GHSA-3p2h-wqq4-wf4h
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-4cag-c4pb-dfaz
Aliases:
CVE-2025-61795
GHSA-hgrr-935x-pq79
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-8myk-ac5b-huh8
Aliases:
CVE-2024-34750
GHSA-wm9w-rjj3-j356
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-9kfe-1esf-uydm
Aliases:
CVE-2025-52434
GHSA-4j3c-42xv-3f84
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes of HTTP/2 connections. This issue affects Apache Tomcat: from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 9.0.107, which fixes the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-cfhw-vmcp-y3bc
Aliases:
CVE-2025-55754
GHSA-vfww-5hm6-hx2j
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-fpgj-82wf-ykbw
Aliases:
CVE-2025-53506
GHSA-25xr-qj8w-c4vf
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-gb2v-96xj-ybad
Aliases:
CVE-2025-48988
GHSA-h3gc-qfqq-6h8f
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-gvhy-d4gm-57d3
Aliases:
CVE-2024-54677
GHSA-653p-vg55-5652
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-k59r-wjt3-wqe5
Aliases:
CVE-2025-52520
GHSA-wr62-c79q-cv37
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-kukv-k3z7-7fgs
Aliases:
CVE-2025-31651
GHSA-ff77-26x5-69cr
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-sr8e-w1qk-r7fz
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
VCID-xqjr-7xfw-mbh2
Aliases:
CVE-2025-55752
GHSA-wmwf-9ccg-fff5
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
9.0.115-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (21)
Vulnerability Summary Aliases
VCID-1e6p-cppr-2bh2 Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue. CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
VCID-2kku-pzer-9ufv Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-55668
GHSA-23hv-mwm6-g8jf
VCID-2rmy-13ym-3bgm CVE-2026-34483
GHSA-rv64-5gf8-9qq8
VCID-35xg-a746-5qgc CVE-2026-29129
GHSA-69cc-cv78-qc8g
VCID-3vdn-j7sj-dfdn Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. CVE-2024-38286
GHSA-7jqf-v358-p8g7
VCID-43j2-w5xt-43g9 CVE-2024-56337
GHSA-27hp-xhwr-wr2m
VCID-5sgv-7nsz-5fa8 CVE-2025-24813
GHSA-83qj-6fr2-vhqg
VCID-74tx-sx8a-guhs CVE-2026-29145
GHSA-95jq-rwvf-vjx4
VCID-8e1c-rbkg-v7c2 CVE-2026-34500
GHSA-24j9-x2wg-9qv6
VCID-8mns-kw6c-a7dk Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. CVE-2024-52316
GHSA-xcpr-7mr4-h4xq
VCID-8war-4v58-eub2 Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue. CVE-2026-24734
GHSA-mgp5-rv84-w37q
VCID-d1fm-vbd1-n7au CVE-2026-34487
GHSA-x4m4-345f-5h5g
VCID-gyed-x6s8-ybhr CVE-2026-24880
GHSA-563x-q5rq-57qp
VCID-k9cg-ehdw-dbh6 Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. CVE-2024-21733
GHSA-f4qf-m5gf-8jm8
VCID-maw6-4qs5-ykae Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. CVE-2025-66614
GHSA-fpj8-gq4v-p354
VCID-p8q2-pt96-5ye8 In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. CVE-2022-34305
GHSA-6j88-6whg-x687
VCID-rsxs-u5cc-rkgj CVE-2026-32990
GHSA-8mc5-53m5-3qj2
VCID-v8ku-sjc8-wfga CVE-2024-50379
GHSA-5j33-cvvr-w245
VCID-y9ne-rw7e-vugf Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue. CVE-2026-24733
GHSA-qq5r-98hh-rxc9
VCID-yrzk-1dbk-muhy CVE-2026-29146
GHSA-h468-7pvh-8vr8
VCID-zw2q-kna8-mqcm CVE-2026-25854
GHSA-9m3c-qcxr-9x87

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T01:18:19.487884+00:00 Debian Oval Importer Fixing VCID-8e1c-rbkg-v7c2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:18:18.753121+00:00 Debian Oval Importer Fixing VCID-2rmy-13ym-3bgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:18:12.061368+00:00 Debian Oval Importer Fixing VCID-74tx-sx8a-guhs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:18:07.414265+00:00 Debian Oval Importer Fixing VCID-35xg-a746-5qgc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:50.316331+00:00 Debian Oval Importer Fixing VCID-gyed-x6s8-ybhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:38.290582+00:00 Debian Oval Importer Fixing VCID-zw2q-kna8-mqcm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:33.010170+00:00 Debian Oval Importer Fixing VCID-d1fm-vbd1-n7au https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:30.339961+00:00 Debian Oval Importer Fixing VCID-rsxs-u5cc-rkgj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:24.203273+00:00 Debian Oval Importer Fixing VCID-yrzk-1dbk-muhy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:00:21.918525+00:00 Debian Oval Importer Fixing VCID-43j2-w5xt-43g9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:07:32.069534+00:00 Debian Oval Importer Affected by VCID-2x6a-3gh1-rkhs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:30:34.476744+00:00 Debian Oval Importer Affected by VCID-gb2v-96xj-ybad https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:01:50.242022+00:00 Debian Oval Importer Affected by VCID-cfhw-vmcp-y3bc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:24:52.907245+00:00 Debian Oval Importer Affected by VCID-k59r-wjt3-wqe5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:06:32.122572+00:00 Debian Oval Importer Fixing VCID-k9cg-ehdw-dbh6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:35:43.151185+00:00 Debian Oval Importer Fixing VCID-maw6-4qs5-ykae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:01:04.230938+00:00 Debian Oval Importer Affected by VCID-8myk-ac5b-huh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:35:57.360613+00:00 Debian Oval Importer Fixing VCID-1e6p-cppr-2bh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:34:05.226004+00:00 Debian Oval Importer Fixing VCID-8war-4v58-eub2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:31:29.200490+00:00 Debian Oval Importer Affected by VCID-gvhy-d4gm-57d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:52:40.614112+00:00 Debian Oval Importer Fixing VCID-2kku-pzer-9ufv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:48:12.775393+00:00 Debian Oval Importer Fixing VCID-p8q2-pt96-5ye8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:40:38.969991+00:00 Debian Oval Importer Affected by VCID-sr8e-w1qk-r7fz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:37:01.723058+00:00 Debian Oval Importer Fixing VCID-y9ne-rw7e-vugf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:36:57.534371+00:00 Debian Oval Importer Affected by VCID-246u-a4rh-yyd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:22:00.073337+00:00 Debian Oval Importer Affected by VCID-xqjr-7xfw-mbh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:50:20.362286+00:00 Debian Oval Importer Fixing VCID-3vdn-j7sj-dfdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:00:32.511305+00:00 Debian Oval Importer Fixing VCID-5sgv-7nsz-5fa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:55:16.644566+00:00 Debian Oval Importer Fixing VCID-v8ku-sjc8-wfga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:03:06.911008+00:00 Debian Oval Importer Affected by VCID-4cag-c4pb-dfaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:43:12.965901+00:00 Debian Oval Importer Fixing VCID-8mns-kw6c-a7dk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:54:34.606051+00:00 Debian Oval Importer Affected by VCID-2zq1-na8s-mfdd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:32:05.986922+00:00 Debian Oval Importer Affected by VCID-kukv-k3z7-7fgs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:30:58.293169+00:00 Debian Oval Importer Affected by VCID-9kfe-1esf-uydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:17:45.123771+00:00 Debian Oval Importer Affected by VCID-fpgj-82wf-ykbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T10:15:44.827374+00:00 Debian Oval Importer Fixing VCID-8e1c-rbkg-v7c2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:44.158193+00:00 Debian Oval Importer Fixing VCID-2rmy-13ym-3bgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:37.578820+00:00 Debian Oval Importer Fixing VCID-74tx-sx8a-guhs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:32.889238+00:00 Debian Oval Importer Fixing VCID-35xg-a746-5qgc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:16.146574+00:00 Debian Oval Importer Fixing VCID-gyed-x6s8-ybhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:03.836794+00:00 Debian Oval Importer Fixing VCID-zw2q-kna8-mqcm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:14:58.542664+00:00 Debian Oval Importer Fixing VCID-d1fm-vbd1-n7au https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:14:55.894986+00:00 Debian Oval Importer Fixing VCID-rsxs-u5cc-rkgj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:14:49.660981+00:00 Debian Oval Importer Fixing VCID-yrzk-1dbk-muhy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:32:34.196678+00:00 Debian Oval Importer Fixing VCID-43j2-w5xt-43g9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:41:31.205073+00:00 Debian Oval Importer Affected by VCID-2x6a-3gh1-rkhs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:05:50.736753+00:00 Debian Oval Importer Affected by VCID-gb2v-96xj-ybad https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:38:03.466376+00:00 Debian Oval Importer Affected by VCID-cfhw-vmcp-y3bc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:02:04.372313+00:00 Debian Oval Importer Affected by VCID-k59r-wjt3-wqe5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:44:31.177472+00:00 Debian Oval Importer Fixing VCID-k9cg-ehdw-dbh6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:14:42.383848+00:00 Debian Oval Importer Fixing VCID-maw6-4qs5-ykae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:41:20.694611+00:00 Debian Oval Importer Affected by VCID-8myk-ac5b-huh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:17:10.175383+00:00 Debian Oval Importer Fixing VCID-1e6p-cppr-2bh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:15:21.303977+00:00 Debian Oval Importer Fixing VCID-8war-4v58-eub2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:12:50.319938+00:00 Debian Oval Importer Affected by VCID-gvhy-d4gm-57d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:34:51.921036+00:00 Debian Oval Importer Fixing VCID-2kku-pzer-9ufv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:30:33.816041+00:00 Debian Oval Importer Fixing VCID-p8q2-pt96-5ye8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:23:13.606470+00:00 Debian Oval Importer Affected by VCID-sr8e-w1qk-r7fz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:19:43.164479+00:00 Debian Oval Importer Fixing VCID-y9ne-rw7e-vugf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:19:39.035944+00:00 Debian Oval Importer Affected by VCID-246u-a4rh-yyd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:05:13.259369+00:00 Debian Oval Importer Affected by VCID-xqjr-7xfw-mbh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:34:54.198530+00:00 Debian Oval Importer Fixing VCID-3vdn-j7sj-dfdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:46:20.072759+00:00 Debian Oval Importer Fixing VCID-5sgv-7nsz-5fa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:41:12.160529+00:00 Debian Oval Importer Fixing VCID-v8ku-sjc8-wfga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:49:40.236849+00:00 Debian Oval Importer Affected by VCID-4cag-c4pb-dfaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:30:02.633212+00:00 Debian Oval Importer Fixing VCID-8mns-kw6c-a7dk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:42:14.240752+00:00 Debian Oval Importer Affected by VCID-2zq1-na8s-mfdd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:20:05.685830+00:00 Debian Oval Importer Affected by VCID-kukv-k3z7-7fgs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:18:59.607216+00:00 Debian Oval Importer Affected by VCID-9kfe-1esf-uydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:06:03.593117+00:00 Debian Oval Importer Affected by VCID-fpgj-82wf-ykbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-09T00:02:51.724969+00:00 Debian Oval Importer Fixing VCID-43j2-w5xt-43g9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:13:59.265514+00:00 Debian Oval Importer Affected by VCID-2x6a-3gh1-rkhs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:39:34.874066+00:00 Debian Oval Importer Affected by VCID-gb2v-96xj-ybad https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:13:19.388834+00:00 Debian Oval Importer Affected by VCID-cfhw-vmcp-y3bc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:39:06.504204+00:00 Debian Oval Importer Affected by VCID-k59r-wjt3-wqe5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:22:21.103720+00:00 Debian Oval Importer Fixing VCID-k9cg-ehdw-dbh6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:53:36.852685+00:00 Debian Oval Importer Fixing VCID-maw6-4qs5-ykae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:21:18.210440+00:00 Debian Oval Importer Affected by VCID-8myk-ac5b-huh8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:58:06.043602+00:00 Debian Oval Importer Fixing VCID-1e6p-cppr-2bh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:56:23.563635+00:00 Debian Oval Importer Fixing VCID-8war-4v58-eub2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:54:00.205096+00:00 Debian Oval Importer Affected by VCID-gvhy-d4gm-57d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:18:06.764643+00:00 Debian Oval Importer Fixing VCID-2kku-pzer-9ufv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:13:58.470738+00:00 Debian Oval Importer Fixing VCID-p8q2-pt96-5ye8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:06:53.451424+00:00 Debian Oval Importer Affected by VCID-sr8e-w1qk-r7fz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:03:29.808579+00:00 Debian Oval Importer Fixing VCID-y9ne-rw7e-vugf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:03:25.614336+00:00 Debian Oval Importer Affected by VCID-246u-a4rh-yyd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:49:32.536163+00:00 Debian Oval Importer Affected by VCID-xqjr-7xfw-mbh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:20:03.451790+00:00 Debian Oval Importer Fixing VCID-3vdn-j7sj-dfdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:33:35.723247+00:00 Debian Oval Importer Fixing VCID-5sgv-7nsz-5fa8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:28:30.501623+00:00 Debian Oval Importer Fixing VCID-v8ku-sjc8-wfga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:39:48.223199+00:00 Debian Oval Importer Affected by VCID-4cag-c4pb-dfaz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:21:19.007465+00:00 Debian Oval Importer Fixing VCID-8mns-kw6c-a7dk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:36:03.405054+00:00 Debian Oval Importer Affected by VCID-2zq1-na8s-mfdd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:14:48.095607+00:00 Debian Oval Importer Affected by VCID-kukv-k3z7-7fgs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:13:42.646006+00:00 Debian Oval Importer Affected by VCID-9kfe-1esf-uydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:01:28.370336+00:00 Debian Oval Importer Affected by VCID-fpgj-82wf-ykbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0