Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie
purl pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (108)
Vulnerability Summary Aliases
VCID-1e6p-cppr-2bh2 Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue. CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
VCID-1hdb-24e3-f3d6 In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up. CVE-2017-5651
GHSA-9hg2-395j-83rm
VCID-1k8f-vsg1-k3d6 Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. CVE-2016-0706
GHSA-6vx3-hr43-cfrh
VCID-246u-a4rh-yyd4 Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-49125
GHSA-wc4r-xq3c-5cf3
VCID-2kku-pzer-9ufv Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-55668
GHSA-23hv-mwm6-g8jf
VCID-2rmy-13ym-3bgm CVE-2026-34483
GHSA-rv64-5gf8-9qq8
VCID-2sbh-sy57-3uez The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected. CVE-2018-1304
GHSA-6rxj-58jh-436r
VCID-2x42-6dsd-tuap tomcat: Escalation to root from tomcat user via %post script CVE-2024-22029
VCID-2x6a-3gh1-rkhs Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue. CVE-2025-48976
GHSA-vv7r-c36w-3prj
VCID-2zq1-na8s-mfdd Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. CVE-2025-31650
GHSA-3p2h-wqq4-wf4h
VCID-35xg-a746-5qgc CVE-2026-29129
GHSA-69cc-cv78-qc8g
VCID-39e3-jfbg-s3hk The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. CVE-2019-10072
GHSA-q4hg-rmq2-52q9
VCID-3r3s-q21j-c3au The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. CVE-2016-6816
GHSA-jc7p-5r39-9477
VCID-3vdn-j7sj-dfdn Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. CVE-2024-38286
GHSA-7jqf-v358-p8g7
VCID-43j2-w5xt-43g9 CVE-2024-56337
GHSA-27hp-xhwr-wr2m
VCID-46bv-6b7y-3bca A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. CVE-2020-11996
GHSA-53hp-jpwq-2jgq
VCID-4aaa-errb-2qdw When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). CVE-2019-0232
GHSA-8vmx-qmch-mpqg
VCID-4cag-c4pb-dfaz Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue. CVE-2025-61795
GHSA-hgrr-935x-pq79
VCID-4tf3-7f5b-2ffu The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL. CVE-2017-7675
GHSA-68g5-8q7f-m384
VCID-56jv-htmt-rkew Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. CVE-2023-24998
GHSA-hfrx-6qgj-fp6c
VCID-5732-xnx7-tkfy A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. CVE-2023-34981
GHSA-mppv-79ch-vw6q
VCID-5781-s1ny-q7ey CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
VCID-5sgv-7nsz-5fa8 CVE-2025-24813
GHSA-83qj-6fr2-vhqg
VCID-66kh-s6cr-tqf9 When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed. CVE-2020-9484
GHSA-344f-f5vg-2jfj
VCID-68fk-4g86-ekbp The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. CVE-2015-5345
GHSA-rh8q-vjgf-gf74
VCID-6kcx-vptm-zbds Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Other, EOL versions may also be affected. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. CVE-2023-42794
GHSA-jm7m-8jh6-29hp
VCID-6pm1-byhk-eqfg The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. CVE-2022-23181
GHSA-9f3j-pm6f-9fm5
VCID-74tx-sx8a-guhs CVE-2026-29145
GHSA-95jq-rwvf-vjx4
VCID-885s-t4dx-dybv Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. CVE-2021-33037
GHSA-4vww-mc66-62m6
VCID-8e1c-rbkg-v7c2 CVE-2026-34500
GHSA-24j9-x2wg-9qv6
VCID-8mns-kw6c-a7dk Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. CVE-2024-52316
GHSA-xcpr-7mr4-h4xq
VCID-8myk-ac5b-huh8 Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. CVE-2024-34750
GHSA-wm9w-rjj3-j356
VCID-8war-4v58-eub2 Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue. CVE-2026-24734
GHSA-mgp5-rv84-w37q
VCID-95d1-arxd-hkd1 Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types. CVE-2016-8735
GHSA-cw54-59pw-4g8c
VCID-9exq-fhv6-bbea The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context. CVE-2016-0763
GHSA-9hjv-9h75-xmpp
VCID-9kfe-1esf-uydm Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes of HTTP/2 connections. This issue affects Apache Tomcat: from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 9.0.107, which fixes the issue. CVE-2025-52434
GHSA-4j3c-42xv-3f84
VCID-9qgr-t27j-y7d3 Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. CVE-2024-52317
GHSA-qvf5-hvjx-wm27
VCID-a8gk-n8bq-87cp When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. CVE-2021-24122
GHSA-2rvv-w9r2-rg7m
VCID-abt4-b2cv-eygv CVE-2026-34486
GHSA-69r9-qgr7-g2wj
VCID-aeeu-fpay-wufz An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. CVE-2018-1336
GHSA-m59c-jpc8-m2x4
VCID-arkn-bca7-hqam The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. CVE-2019-0221
GHSA-jjpq-gp5q-8q6w
VCID-ayrd-8ntf-hkh3 If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. CVE-2022-25762
GHSA-h3ch-5pp2-vh6w
VCID-b3bb-9ajg-sfc9 Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. CVE-2023-46589
GHSA-fccv-jmmp-qg76
VCID-bks8-nvm9-vbgy Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-49124
GHSA-42wg-hm62-jcwg
VCID-c12c-fsy1-17ee Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability. CVE-2016-5388
GHSA-v646-rx6w-r3qq
VCID-cfhw-vmcp-y3bc Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue. CVE-2025-55754
GHSA-vfww-5hm6-hx2j
VCID-d1fm-vbd1-n7au CVE-2026-34487
GHSA-x4m4-345f-5h5g
VCID-dtvw-92bk-wbcf A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64. CVE-2021-30639
GHSA-44qp-qhfv-c7f6
VCID-dy6m-zt6r-9ubd Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. CVE-2021-41079
GHSA-59g9-7gfx-c72p
VCID-dzan-r49k-kqab An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. CVE-2020-13934
GHSA-vf77-8h7g-gghp
VCID-dzpn-w4b3-vbcm When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. CVE-2019-17563
GHSA-9xcj-c8cr-8c3c
VCID-eb37-mkxf-7fgw When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. CVE-2020-1938
GHSA-c9hw-wf7x-jp9j
VCID-enaj-f97c-jbh7 The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances. CVE-2017-7674
GHSA-73rx-3f9r-x949
VCID-f77q-v5xp-e7dy When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. CVE-2018-11784
GHSA-5q99-f34m-67gc
VCID-fpgj-82wf-ykbw Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue. CVE-2025-53506
GHSA-25xr-qj8w-c4vf
VCID-fyfz-6tr5-2fc7 The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method. CVE-2017-5664
GHSA-jmvv-524f-hj5j
VCID-g7bk-891a-uufy Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them. CVE-2018-1305
GHSA-jx6h-3fjx-cgv5
VCID-gb2v-96xj-ybad Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. CVE-2025-48988
GHSA-h3gc-qfqq-6h8f
VCID-gvhy-d4gm-57d3 CVE-2024-54677
GHSA-653p-vg55-5652
VCID-gyed-x6s8-ybhr CVE-2026-24880
GHSA-563x-q5rq-57qp
VCID-hmbm-5ysw-77bu While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application. CVE-2017-5648
GHSA-3vx3-xf6q-r5xp
VCID-hves-r5bg-yfes A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions. CVE-2016-8745
GHSA-w3j5-q8f2-3cqq
VCID-j6cj-ftyd-3ffa URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application. CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
VCID-j8tk-s915-pbfy The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. CVE-2021-43980
GHSA-jx7c-7mj5-9438
VCID-k59r-wjt3-wqe5 For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue. CVE-2025-52520
GHSA-wr62-c79q-cv37
VCID-k9cg-ehdw-dbh6 Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. CVE-2024-21733
GHSA-f4qf-m5gf-8jm8
VCID-kukv-k3z7-7fgs Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue. CVE-2025-31651
GHSA-ff77-26x5-69cr
VCID-kwab-3s4q-eka4 A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. CVE-2021-30640
GHSA-36qh-35cm-5w2w
VCID-kyb8-rvyw-s7b1 Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java. CVE-2015-5346
GHSA-jrcp-c39h-r29x
VCID-m1zd-uytj-3bej A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C. CVE-2017-5647
GHSA-3gv7-3h64-78cm
VCID-m2zn-ja8d-7kg8 The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. CVE-2018-8034
GHSA-46j3-r4pj-4835
VCID-maw6-4qs5-ykae Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. CVE-2025-66614
GHSA-fpj8-gq4v-p354
VCID-n3ab-nk7c-hqc9 The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. CVE-2021-25329
GHSA-jgwr-3qm3-26f3
VCID-n3zn-tuck-gkfe The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. CVE-2018-8014
GHSA-r4x2-3cq5-hqvp
VCID-n9yk-e49f-n7e7 Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. CVE-2023-42795
GHSA-g8pj-r55q-5c2v
VCID-nmq2-8ysj-4fbc If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. CVE-2022-42252
GHSA-p22x-g9px-3945
VCID-nvbx-q971-skgm The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. CVE-2020-13935
GHSA-m7jv-hq7h-mq7c
VCID-p6pa-f1fg-hbhg Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. CVE-2024-23672
GHSA-v682-8vv8-vpwr
VCID-p8q2-pt96-5ye8 In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. CVE-2022-34305
GHSA-6j88-6whg-x687
VCID-pqxe-tfhk-47b7 The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. CVE-2016-3092
GHSA-fvm3-cfvj-gxqq
VCID-qbfw-16rt-qyc7 As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was not correct. As a result, some scripts may have failed to execute as expected and other scripts may have been executed unexpectedly. Note that the behaviour of the CGI servlet has remained unchanged in this regard. It is only the documentation of the behaviour that was wrong and has been corrected. CVE-2017-15706
GHSA-372q-33vh-8mpc
VCID-qkx6-32cj-jfbp The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks. CVE-2022-29885
GHSA-r84p-88g2-2vx2
VCID-ran8-rnqn-tkbc While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. CVE-2020-17527
GHSA-vvw4-rfwf-p6hx
VCID-rq42-qvsy-hue6 The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. CVE-2019-17569
GHSA-767j-jfh2-jvrc
VCID-rsxs-u5cc-rkgj CVE-2026-32990
GHSA-8mc5-53m5-3qj2
VCID-ruuh-g3fa-m7d8 When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance. CVE-2019-12418
GHSA-hh3j-x4mc-g48r
VCID-rzj2-4kcj-43dq Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. CVE-2023-45648
GHSA-r6j3-px5g-cq3x
VCID-s24s-sbsx-b3f5 Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. CVE-2024-52318
GHSA-f632-9449-3j4w
VCID-sr8e-w1qk-r7fz Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue. CVE-2025-46701
GHSA-h2fw-rfh5-95r3
VCID-stds-vw5z-auhp The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. CVE-2022-45143
GHSA-rq2w-37h9-vg94
VCID-t2ne-75ck-eqcr When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. CVE-2021-25122
GHSA-j39c-c8hj-x4j3
VCID-tfrs-d458-tfaq The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. CVE-2016-0714
GHSA-mv42-px54-87jw
VCID-u3ck-cvgt-fuhd In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads. CVE-2017-5650
GHSA-9785-w233-x6hv
VCID-v7tp-1t4h-zqeg When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. CVE-2023-28708
GHSA-2c9m-w27f-53rm
VCID-v8ku-sjc8-wfga CVE-2024-50379
GHSA-5j33-cvvr-w245
VCID-vhjj-dnft-kkf4 The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token. CVE-2015-5351
GHSA-w7cg-5969-678w
VCID-vsdf-4tfj-uybe Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. CVE-2024-24549
GHSA-7w75-32cg-r6g2
VCID-wbaq-j85q-y3c6 The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. CVE-2019-0199
GHSA-qcxh-w3j9-58qr
VCID-wgsc-dnn1-ukeq If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. CVE-2020-13943
GHSA-f268-65qc-98vg
VCID-wptr-hkjx-s7c3 The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. CVE-2021-42340
GHSA-wph7-x527-w3h5
VCID-xgr8-tpv5-q3b2 The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. CVE-2023-28709
GHSA-cx6h-86xw-9x34
VCID-xqjr-7xfw-mbh2 Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue. CVE-2025-55752
GHSA-wmwf-9ccg-fff5
VCID-xshb-a2kb-c7gs If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. CVE-2018-8037
GHSA-6v52-mj5r-7j2m
VCID-y9ne-rw7e-vugf Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue. CVE-2026-24733
GHSA-qq5r-98hh-rxc9
VCID-yfx4-4gsc-2kgh In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. CVE-2020-1935
GHSA-qxf4-chvg-4r8r
VCID-yrzk-1dbk-muhy CVE-2026-29146
GHSA-h468-7pvh-8vr8
VCID-yxpq-rrry-j3h8 The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible. CVE-2016-6817
GHSA-698c-2x4j-g9gq
VCID-zw2q-kna8-mqcm CVE-2026-25854
GHSA-9m3c-qcxr-9x87

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:30:42.896691+00:00 Debian Importer Fixing VCID-gvhy-d4gm-57d3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:28:46.679465+00:00 Debian Importer Fixing VCID-yfx4-4gsc-2kgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:28:46.454795+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:27:25.923778+00:00 Debian Importer Fixing VCID-gb2v-96xj-ybad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:26:02.214730+00:00 Debian Importer Fixing VCID-d1fm-vbd1-n7au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:20:43.835574+00:00 Debian Importer Fixing VCID-tfrs-d458-tfaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:20:15.668983+00:00 Debian Importer Fixing VCID-39e3-jfbg-s3hk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:51.734390+00:00 Debian Importer Fixing VCID-1e6p-cppr-2bh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:11:41.745707+00:00 Debian Importer Fixing VCID-gyed-x6s8-ybhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:03:33.739846+00:00 Debian Importer Fixing VCID-1hdb-24e3-f3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:15.118453+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:55:59.672847+00:00 Debian Importer Fixing VCID-hves-r5bg-yfes https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:55:07.018244+00:00 Debian Importer Fixing VCID-2x6a-3gh1-rkhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:53:01.479598+00:00 Debian Importer Fixing VCID-abt4-b2cv-eygv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:50:36.061134+00:00 Debian Importer Fixing VCID-qbfw-16rt-qyc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:49:38.163968+00:00 Debian Importer Fixing VCID-m2zn-ja8d-7kg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:27.720508+00:00 Debian Importer Fixing VCID-nvbx-q971-skgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:41:26.154764+00:00 Debian Importer Fixing VCID-246u-a4rh-yyd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:45.607224+00:00 Debian Importer Fixing VCID-8war-4v58-eub2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:40:34.959807+00:00 Debian Importer Fixing VCID-wbaq-j85q-y3c6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:39:33.187843+00:00 Debian Importer Fixing VCID-t2ne-75ck-eqcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:38:13.338921+00:00 Debian Importer Fixing VCID-95d1-arxd-hkd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:37:20.557082+00:00 Debian Importer Fixing VCID-dzan-r49k-kqab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:36:47.609628+00:00 Debian Importer Fixing VCID-4tf3-7f5b-2ffu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:17.564319+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:45.503448+00:00 Debian Importer Fixing VCID-68fk-4g86-ekbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:19.132565+00:00 Debian Importer Fixing VCID-ran8-rnqn-tkbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:29:30.112201+00:00 Debian Importer Fixing VCID-k9cg-ehdw-dbh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:25:05.358654+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:34.322717+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:43.831229+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:30.096222+00:00 Debian Importer Fixing VCID-2kku-pzer-9ufv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:33.404996+00:00 Debian Importer Fixing VCID-vhjj-dnft-kkf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:24.093644+00:00 Debian Importer Fixing VCID-wptr-hkjx-s7c3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:59.219071+00:00 Debian Importer Fixing VCID-hmbm-5ysw-77bu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:05.489779+00:00 Debian Importer Fixing VCID-dzpn-w4b3-vbcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:38.140621+00:00 Debian Importer Fixing VCID-43j2-w5xt-43g9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:03.929404+00:00 Debian Importer Fixing VCID-j8tk-s915-pbfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:05.737339+00:00 Debian Importer Fixing VCID-2sbh-sy57-3uez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:36.437712+00:00 Debian Importer Fixing VCID-y9ne-rw7e-vugf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:40:03.935609+00:00 Debian Importer Fixing VCID-3r3s-q21j-c3au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:39:50.210437+00:00 Debian Importer Fixing VCID-rsxs-u5cc-rkgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:55.250915+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:34.481826+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:22.552899+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:33.193074+00:00 Debian Importer Fixing VCID-885s-t4dx-dybv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:00.228916+00:00 Debian Importer Fixing VCID-p8q2-pt96-5ye8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:44.652245+00:00 Debian Importer Fixing VCID-kyb8-rvyw-s7b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:38.550944+00:00 Debian Importer Fixing VCID-74tx-sx8a-guhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:18.648169+00:00 Debian Importer Fixing VCID-dy6m-zt6r-9ubd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:56.447464+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:28.880984+00:00 Debian Importer Fixing VCID-n3zn-tuck-gkfe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:24.033012+00:00 Debian Importer Fixing VCID-n3ab-nk7c-hqc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:46.170413+00:00 Debian Importer Fixing VCID-enaj-f97c-jbh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:30.020245+00:00 Debian Importer Fixing VCID-fpgj-82wf-ykbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:51.552449+00:00 Debian Importer Fixing VCID-2rmy-13ym-3bgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:24.055663+00:00 Debian Importer Fixing VCID-kwab-3s4q-eka4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:00:42.225907+00:00 Debian Importer Fixing VCID-maw6-4qs5-ykae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:29.278519+00:00 Debian Importer Fixing VCID-6pm1-byhk-eqfg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:58.590673+00:00 Debian Importer Fixing VCID-cfhw-vmcp-y3bc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:27.870264+00:00 Debian Importer Fixing VCID-c12c-fsy1-17ee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:46.296878+00:00 Debian Importer Fixing VCID-arkn-bca7-hqam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:54.451909+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:06.060171+00:00 Debian Importer Fixing VCID-9exq-fhv6-bbea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:49.983050+00:00 Debian Importer Fixing VCID-1k8f-vsg1-k3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:05.250338+00:00 Debian Importer Fixing VCID-xqjr-7xfw-mbh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:23.566323+00:00 Debian Importer Fixing VCID-eb37-mkxf-7fgw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:51.241589+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:25.098075+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:17.740808+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:49.442073+00:00 Debian Importer Fixing VCID-aeeu-fpay-wufz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:31.145794+00:00 Debian Importer Fixing VCID-46bv-6b7y-3bca https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:26.485642+00:00 Debian Importer Fixing VCID-xshb-a2kb-c7gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:54.468135+00:00 Debian Importer Fixing VCID-pqxe-tfhk-47b7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:37.175435+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:34.121548+00:00 Debian Importer Fixing VCID-fyfz-6tr5-2fc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:29.355293+00:00 Debian Importer Fixing VCID-v8ku-sjc8-wfga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:52.133709+00:00 Debian Importer Fixing VCID-kukv-k3z7-7fgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:27.199465+00:00 Debian Importer Fixing VCID-yxpq-rrry-j3h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:31.239860+00:00 Debian Importer Fixing VCID-66kh-s6cr-tqf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:33.256010+00:00 Debian Importer Fixing VCID-wgsc-dnn1-ukeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:29.050988+00:00 Debian Importer Fixing VCID-4aaa-errb-2qdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:49.630194+00:00 Debian Importer Fixing VCID-8e1c-rbkg-v7c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:46.108844+00:00 Debian Importer Fixing VCID-35xg-a746-5qgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:18.495824+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:16.351111+00:00 Debian Importer Fixing VCID-5sgv-7nsz-5fa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:44.578808+00:00 Debian Importer Fixing VCID-qkx6-32cj-jfbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:56.893693+00:00 Debian Importer Fixing VCID-2zq1-na8s-mfdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:36.109140+00:00 Debian Importer Fixing VCID-f77q-v5xp-e7dy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:23.377799+00:00 Debian Importer Fixing VCID-zw2q-kna8-mqcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:39.818212+00:00 Debian Importer Fixing VCID-9kfe-1esf-uydm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:16.746768+00:00 Debian Importer Fixing VCID-8mns-kw6c-a7dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:12.455179+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:15:54.419990+00:00 Debian Importer Fixing VCID-sr8e-w1qk-r7fz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:12:15.591199+00:00 Debian Importer Fixing VCID-dtvw-92bk-wbcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:26.943245+00:00 Debian Importer Fixing VCID-u3ck-cvgt-fuhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:47.510324+00:00 Debian Importer Fixing VCID-ayrd-8ntf-hkh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:01:30.371274+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:53.492713+00:00 Debian Importer Fixing VCID-a8gk-n8bq-87cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:56.521970+00:00 Debian Importer Fixing VCID-g7bk-891a-uufy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:13.338825+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:31.288364+00:00 Debian Importer Fixing VCID-4cag-c4pb-dfaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:28.468001+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:08.620482+00:00 Debian Importer Fixing VCID-ruuh-g3fa-m7d8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:19.647531+00:00 Debian Importer Fixing VCID-m1zd-uytj-3bej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:57.102958+00:00 Debian Importer Fixing VCID-k59r-wjt3-wqe5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:16.182884+00:00 Debian Importer Fixing VCID-yrzk-1dbk-muhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:59.782620+00:00 Debian Importer Fixing VCID-rq42-qvsy-hue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:19:32.487230+00:00 Debian Importer Fixing VCID-gvhy-d4gm-57d3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:05.748282+00:00 Debian Importer Fixing VCID-yfx4-4gsc-2kgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:05.555416+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:17:08.711772+00:00 Debian Importer Fixing VCID-gb2v-96xj-ybad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:11:55.328277+00:00 Debian Importer Fixing VCID-tfrs-d458-tfaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:11:31.436768+00:00 Debian Importer Fixing VCID-39e3-jfbg-s3hk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:45.945652+00:00 Debian Importer Fixing VCID-1e6p-cppr-2bh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:40.277540+00:00 Debian Importer Fixing VCID-1hdb-24e3-f3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:41.731330+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:53.331444+00:00 Debian Importer Fixing VCID-hves-r5bg-yfes https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:12.234882+00:00 Debian Importer Fixing VCID-2x6a-3gh1-rkhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:51.292521+00:00 Debian Importer Fixing VCID-qbfw-16rt-qyc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:06.062003+00:00 Debian Importer Fixing VCID-m2zn-ja8d-7kg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:11.915586+00:00 Debian Importer Fixing VCID-nvbx-q971-skgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:41:54.458445+00:00 Debian Importer Fixing VCID-246u-a4rh-yyd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:41:23.758560+00:00 Debian Importer Fixing VCID-8war-4v58-eub2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:41:16.792074+00:00 Debian Importer Fixing VCID-wbaq-j85q-y3c6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:40:33.531748+00:00 Debian Importer Fixing VCID-t2ne-75ck-eqcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:31.235653+00:00 Debian Importer Fixing VCID-95d1-arxd-hkd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:52.814500+00:00 Debian Importer Fixing VCID-dzan-r49k-kqab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:26.745101+00:00 Debian Importer Fixing VCID-4tf3-7f5b-2ffu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:19.574782+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:47.356732+00:00 Debian Importer Fixing VCID-68fk-4g86-ekbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:27.016055+00:00 Debian Importer Fixing VCID-ran8-rnqn-tkbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:08.719649+00:00 Debian Importer Fixing VCID-k9cg-ehdw-dbh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:59.231670+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:06.335969+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:29.356683+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:27.509523+00:00 Debian Importer Fixing VCID-2kku-pzer-9ufv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:51.997955+00:00 Debian Importer Fixing VCID-vhjj-dnft-kkf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:45.103027+00:00 Debian Importer Fixing VCID-wptr-hkjx-s7c3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:24.168643+00:00 Debian Importer Fixing VCID-hmbm-5ysw-77bu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:23.222728+00:00 Debian Importer Fixing VCID-dzpn-w4b3-vbcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:15.118678+00:00 Debian Importer Fixing VCID-43j2-w5xt-43g9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:12.719712+00:00 Debian Importer Fixing VCID-j8tk-s915-pbfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:26.213729+00:00 Debian Importer Fixing VCID-2sbh-sy57-3uez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:06.392155+00:00 Debian Importer Fixing VCID-y9ne-rw7e-vugf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:54.599816+00:00 Debian Importer Fixing VCID-3r3s-q21j-c3au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:59.599875+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:04.779828+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:57.093874+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:55.690759+00:00 Debian Importer Fixing VCID-885s-t4dx-dybv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:04.128905+00:00 Debian Importer Fixing VCID-p8q2-pt96-5ye8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:36.314113+00:00 Debian Importer Fixing VCID-kyb8-rvyw-s7b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:16.552435+00:00 Debian Importer Fixing VCID-dy6m-zt6r-9ubd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:01.164553+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:39.197425+00:00 Debian Importer Fixing VCID-n3zn-tuck-gkfe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:10.842135+00:00 Debian Importer Fixing VCID-n3ab-nk7c-hqc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:55.784453+00:00 Debian Importer Fixing VCID-enaj-f97c-jbh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:29.706231+00:00 Debian Importer Fixing VCID-fpgj-82wf-ykbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:58.264076+00:00 Debian Importer Fixing VCID-kwab-3s4q-eka4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:25.578081+00:00 Debian Importer Fixing VCID-maw6-4qs5-ykae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:43.429337+00:00 Debian Importer Fixing VCID-6pm1-byhk-eqfg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:44.285907+00:00 Debian Importer Fixing VCID-cfhw-vmcp-y3bc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:20.146503+00:00 Debian Importer Fixing VCID-c12c-fsy1-17ee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:07.817752+00:00 Debian Importer Fixing VCID-arkn-bca7-hqam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:27.970701+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:18.232543+00:00 Debian Importer Fixing VCID-9exq-fhv6-bbea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:47.647436+00:00 Debian Importer Fixing VCID-1k8f-vsg1-k3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:19.735829+00:00 Debian Importer Fixing VCID-xqjr-7xfw-mbh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:03.393975+00:00 Debian Importer Fixing VCID-eb37-mkxf-7fgw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:39.228985+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:18.495713+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:25.084678+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:20.270215+00:00 Debian Importer Fixing VCID-aeeu-fpay-wufz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:08.244975+00:00 Debian Importer Fixing VCID-46bv-6b7y-3bca https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:20.523670+00:00 Debian Importer Fixing VCID-xshb-a2kb-c7gs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:54.741591+00:00 Debian Importer Fixing VCID-pqxe-tfhk-47b7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:05.324764+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:49.097281+00:00 Debian Importer Fixing VCID-fyfz-6tr5-2fc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:45.864265+00:00 Debian Importer Fixing VCID-v8ku-sjc8-wfga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:24.376664+00:00 Debian Importer Fixing VCID-kukv-k3z7-7fgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:19.190968+00:00 Debian Importer Fixing VCID-yxpq-rrry-j3h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:28.463668+00:00 Debian Importer Fixing VCID-66kh-s6cr-tqf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:56.389808+00:00 Debian Importer Fixing VCID-wgsc-dnn1-ukeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:54.014504+00:00 Debian Importer Fixing VCID-4aaa-errb-2qdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:49.122333+00:00 Debian Importer Fixing VCID-8e1c-rbkg-v7c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:49.081562+00:00 Debian Importer Fixing VCID-d1fm-vbd1-n7au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:49.031442+00:00 Debian Importer Fixing VCID-abt4-b2cv-eygv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.989559+00:00 Debian Importer Fixing VCID-2rmy-13ym-3bgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.945043+00:00 Debian Importer Fixing VCID-rsxs-u5cc-rkgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.904171+00:00 Debian Importer Fixing VCID-yrzk-1dbk-muhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.862750+00:00 Debian Importer Fixing VCID-74tx-sx8a-guhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.820642+00:00 Debian Importer Fixing VCID-35xg-a746-5qgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.782008+00:00 Debian Importer Fixing VCID-zw2q-kna8-mqcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:48.741574+00:00 Debian Importer Fixing VCID-gyed-x6s8-ybhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:30.669824+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:42.005777+00:00 Debian Importer Fixing VCID-5sgv-7nsz-5fa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:25.040314+00:00 Debian Importer Fixing VCID-qkx6-32cj-jfbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:06.362431+00:00 Debian Importer Fixing VCID-2zq1-na8s-mfdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:52.453839+00:00 Debian Importer Fixing VCID-f77q-v5xp-e7dy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:38.945567+00:00 Debian Importer Fixing VCID-9kfe-1esf-uydm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:22.768366+00:00 Debian Importer Fixing VCID-8mns-kw6c-a7dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:45.673627+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:36.511076+00:00 Debian Importer Fixing VCID-sr8e-w1qk-r7fz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:31.706896+00:00 Debian Importer Fixing VCID-dtvw-92bk-wbcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:18.018888+00:00 Debian Importer Fixing VCID-u3ck-cvgt-fuhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:55.394433+00:00 Debian Importer Fixing VCID-ayrd-8ntf-hkh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:04.904485+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:15.590374+00:00 Debian Importer Fixing VCID-a8gk-n8bq-87cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:39.680322+00:00 Debian Importer Fixing VCID-g7bk-891a-uufy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:21.173551+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:24.102172+00:00 Debian Importer Fixing VCID-4cag-c4pb-dfaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:21.784925+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:05.935835+00:00 Debian Importer Fixing VCID-ruuh-g3fa-m7d8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:56.336157+00:00 Debian Importer Fixing VCID-m1zd-uytj-3bej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:23.050716+00:00 Debian Importer Fixing VCID-k59r-wjt3-wqe5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:47.199978+00:00 Debian Importer Fixing VCID-rq42-qvsy-hue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:27.045663+00:00 Debian Importer Fixing VCID-8war-4v58-eub2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:27.011083+00:00 Debian Importer Fixing VCID-y9ne-rw7e-vugf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.976962+00:00 Debian Importer Fixing VCID-maw6-4qs5-ykae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.931570+00:00 Debian Importer Fixing VCID-4cag-c4pb-dfaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.889624+00:00 Debian Importer Fixing VCID-cfhw-vmcp-y3bc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.847783+00:00 Debian Importer Fixing VCID-xqjr-7xfw-mbh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.813677+00:00 Debian Importer Fixing VCID-2kku-pzer-9ufv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.773236+00:00 Debian Importer Fixing VCID-fpgj-82wf-ykbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.732515+00:00 Debian Importer Fixing VCID-k59r-wjt3-wqe5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.691347+00:00 Debian Importer Fixing VCID-9kfe-1esf-uydm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.649625+00:00 Debian Importer Fixing VCID-246u-a4rh-yyd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.608557+00:00 Debian Importer Fixing VCID-bks8-nvm9-vbgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.574562+00:00 Debian Importer Fixing VCID-1e6p-cppr-2bh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.533648+00:00 Debian Importer Fixing VCID-gb2v-96xj-ybad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.492461+00:00 Debian Importer Fixing VCID-2x6a-3gh1-rkhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.451080+00:00 Debian Importer Fixing VCID-sr8e-w1qk-r7fz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.410021+00:00 Debian Importer Fixing VCID-kukv-k3z7-7fgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.368568+00:00 Debian Importer Fixing VCID-2zq1-na8s-mfdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.326999+00:00 Debian Importer Fixing VCID-5sgv-7nsz-5fa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.285899+00:00 Debian Importer Fixing VCID-43j2-w5xt-43g9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.244753+00:00 Debian Importer Fixing VCID-gvhy-d4gm-57d3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.203500+00:00 Debian Importer Fixing VCID-s24s-sbsx-b3f5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.162597+00:00 Debian Importer Fixing VCID-9qgr-t27j-y7d3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.122214+00:00 Debian Importer Fixing VCID-8mns-kw6c-a7dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.082131+00:00 Debian Importer Fixing VCID-v8ku-sjc8-wfga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.041692+00:00 Debian Importer Fixing VCID-3vdn-j7sj-dfdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:26.000099+00:00 Debian Importer Fixing VCID-8myk-ac5b-huh8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.965815+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.932342+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.892605+00:00 Debian Importer Fixing VCID-2x42-6dsd-tuap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.843291+00:00 Debian Importer Fixing VCID-k9cg-ehdw-dbh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.809659+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.769506+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.729137+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.688191+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.646734+00:00 Debian Importer Fixing VCID-6kcx-vptm-zbds https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.605745+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.564965+00:00 Debian Importer Fixing VCID-5732-xnx7-tkfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.524299+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.483142+00:00 Debian Importer Fixing VCID-v7tp-1t4h-zqeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.440736+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.392117+00:00 Debian Importer Fixing VCID-stds-vw5z-auhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.343007+00:00 Debian Importer Fixing VCID-nmq2-8ysj-4fbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.301196+00:00 Debian Importer Fixing VCID-p8q2-pt96-5ye8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.252320+00:00 Debian Importer Fixing VCID-qkx6-32cj-jfbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.211742+00:00 Debian Importer Fixing VCID-ayrd-8ntf-hkh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.164022+00:00 Debian Importer Fixing VCID-6pm1-byhk-eqfg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.115119+00:00 Debian Importer Fixing VCID-j8tk-s915-pbfy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.065558+00:00 Debian Importer Fixing VCID-wptr-hkjx-s7c3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.016404+00:00 Debian Importer Fixing VCID-dy6m-zt6r-9ubd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.962276+00:00 Debian Importer Fixing VCID-885s-t4dx-dybv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.905322+00:00 Debian Importer Fixing VCID-kwab-3s4q-eka4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.861727+00:00 Debian Importer Fixing VCID-dtvw-92bk-wbcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.821492+00:00 Debian Importer Fixing VCID-n3ab-nk7c-hqc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.780401+00:00 Debian Importer Fixing VCID-t2ne-75ck-eqcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.740504+00:00 Debian Importer Fixing VCID-a8gk-n8bq-87cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.693988+00:00 Debian Importer Fixing VCID-66kh-s6cr-tqf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.640364+00:00 Debian Importer Fixing VCID-eb37-mkxf-7fgw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.597030+00:00 Debian Importer Fixing VCID-yfx4-4gsc-2kgh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.555551+00:00 Debian Importer Fixing VCID-ran8-rnqn-tkbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.514182+00:00 Debian Importer Fixing VCID-wgsc-dnn1-ukeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.471450+00:00 Debian Importer Fixing VCID-nvbx-q971-skgm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.430308+00:00 Debian Importer Fixing VCID-dzan-r49k-kqab https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.388623+00:00 Debian Importer Fixing VCID-46bv-6b7y-3bca https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.348383+00:00 Debian Importer Fixing VCID-rq42-qvsy-hue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.307629+00:00 Debian Importer Fixing VCID-dzpn-w4b3-vbcm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.265854+00:00 Debian Importer Fixing VCID-ruuh-g3fa-m7d8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.218756+00:00 Debian Importer Fixing VCID-39e3-jfbg-s3hk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.174631+00:00 Debian Importer Fixing VCID-4aaa-errb-2qdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.127122+00:00 Debian Importer Fixing VCID-arkn-bca7-hqam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.081756+00:00 Debian Importer Fixing VCID-wbaq-j85q-y3c6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:24.040151+00:00 Debian Importer Fixing VCID-xshb-a2kb-c7gs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.999242+00:00 Debian Importer Fixing VCID-m2zn-ja8d-7kg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.958178+00:00 Debian Importer Fixing VCID-n3zn-tuck-gkfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.917335+00:00 Debian Importer Fixing VCID-aeeu-fpay-wufz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.875563+00:00 Debian Importer Fixing VCID-g7bk-891a-uufy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.834292+00:00 Debian Importer Fixing VCID-2sbh-sy57-3uez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.793207+00:00 Debian Importer Fixing VCID-f77q-v5xp-e7dy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.752697+00:00 Debian Importer Fixing VCID-4tf3-7f5b-2ffu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.712018+00:00 Debian Importer Fixing VCID-enaj-f97c-jbh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.670685+00:00 Debian Importer Fixing VCID-fyfz-6tr5-2fc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.630164+00:00 Debian Importer Fixing VCID-1hdb-24e3-f3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.589919+00:00 Debian Importer Fixing VCID-u3ck-cvgt-fuhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.549550+00:00 Debian Importer Fixing VCID-hmbm-5ysw-77bu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.508897+00:00 Debian Importer Fixing VCID-m1zd-uytj-3bej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.468097+00:00 Debian Importer Fixing VCID-qbfw-16rt-qyc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.424331+00:00 Debian Importer Fixing VCID-hves-r5bg-yfes https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.381940+00:00 Debian Importer Fixing VCID-95d1-arxd-hkd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.341893+00:00 Debian Importer Fixing VCID-yxpq-rrry-j3h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.301946+00:00 Debian Importer Fixing VCID-3r3s-q21j-c3au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.261867+00:00 Debian Importer Fixing VCID-c12c-fsy1-17ee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.221408+00:00 Debian Importer Fixing VCID-pqxe-tfhk-47b7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.178965+00:00 Debian Importer Fixing VCID-9exq-fhv6-bbea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.138225+00:00 Debian Importer Fixing VCID-tfrs-d458-tfaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.097589+00:00 Debian Importer Fixing VCID-1k8f-vsg1-k3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.056900+00:00 Debian Importer Fixing VCID-vhjj-dnft-kkf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:23.015674+00:00 Debian Importer Fixing VCID-kyb8-rvyw-s7b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:22.971267+00:00 Debian Importer Fixing VCID-68fk-4g86-ekbp https://security-tracker.debian.org/tracker/data/json 38.1.0