Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/zoneminder@1.36.35%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/zoneminder@1.36.35%2Bdfsg1-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (77)
Vulnerability Summary Aliases
VCID-11zt-rw3z-87gx Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view download (download.php) because proper filtration is omitted. CVE-2019-7333
VCID-1b3u-17mt-5qfe ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65. CVE-2024-51482
VCID-23ug-uzth-tybf Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view 'state' (aka Run State) (state.php) does no input validation to the value supplied to the 'New State' (aka newState) field, allowing an attacker to execute HTML or JavaScript code. CVE-2019-7352
VCID-35hj-x1e2-eug1 ZoneMinder before 1.32.3 has SQL Injection via the skins/classic/views/control.php groupSql parameter, as demonstrated by a newGroup[MonitorIds][] value. CVE-2019-8428
VCID-3xuk-942c-kkbf ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the montagereview via the displayinterval, speed, and scale parameters. This vulnerability is fixed in 1.36.34 and 1.37.61. CVE-2024-43359
VCID-3zrk-nztf-nqfd Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view 'options' (options.php) does no input validation for the WEB_TITLE, HOME_URL, HOME_CONTENT, or WEB_CONSOLE_BANNER value, allowing an attacker to execute HTML or JavaScript code. This relates to functions.php. CVE-2019-7345
VCID-4mfm-zzrx-6ffb ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the filter view via the filter[Id]. This vulnerability is fixed in 1.36.34 and 1.37.61. CVE-2024-43358
VCID-4qtk-7myx-vfcd ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26035
VCID-4zbd-b8b7-tfa4 Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as multiple views under web/skins/classic/views insecurely utilize $_REQUEST['PHP_SELF'], without applying any proper filtration. CVE-2019-7325
VCID-578u-3ew5-qyh5 Multiple directory traversal vulnerabilities in ZoneMinder 1.24.x before 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) view, (2) request, or (3) action parameter. CVE-2013-0332
VCID-5ba3-bxk1-pbht Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the view _monitor_filters.php contains takes in input from the user and saves it into the session, and retrieves it later (insecurely). The values of the MonitorName and Source parameters are being displayed without any output filtration being applied. This relates to the view=cycle value. CVE-2019-7336
VCID-619e-k5cr-nyap Multiple cross-site scripting (XSS) vulnerabilities in ZoneMinder 1.23.3 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified "zm_html_view_*.php" files. CVE-2008-3881
VCID-643r-dxjk-63d2 zoneminder: command injection, SQL injection and multiple XSS issues (CVE-2008-3882, CVE-2008-3880, CVE-2008-3881) CVE-2008-3880
VCID-64wa-wgn6-nub8 ZoneMinder 1.23.3 on Gentoo Linux uses 0644 permissions for /etc/zm.conf, which allows local users to obtain the database username and password by reading this file. CVE-2008-6756
VCID-694p-mbsg-e7f6 Multiple reflected XSS vulnerabilities exist within form and link input parameters of ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, which allows a remote attacker to execute malicious scripts within an authenticated client's browser. The URL is /zm/index.php and sample parameters could include action=login&view=postlogin[XSS] view=console[XSS] view=groups[XSS] view=events&filter[terms][1][cnj]=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=[XSS]and view=events&limit=1%22%3E%3C/a%3E[XSS] (among others). CVE-2017-5367
VCID-6mdb-h6fb-c7d6 POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[AutoExecuteCmd]' parameter value in the view filter (filter.php) because proper filtration is omitted. CVE-2019-7342
VCID-6xnz-k4kg-eqhd Reflected - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[Method]' parameter value in the view monitor (monitor.php) because proper filtration is omitted. CVE-2019-7343
VCID-7vc9-wfjb-t3ba ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with the permission of the victim. This could lead to data loss and/or further exploitation including account takeover. This issue has been addressed in versions `1.36.27` and `1.37.24`. Users are advised to upgrade. Users unable to upgrade should disable database logging. CVE-2022-39285
VCID-7x1r-12y1-ekfk POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'filter[Query][terms][0][val]' parameter value in the view filter (filter.php) because proper filtration is omitted. CVE-2019-7340
VCID-7x51-uyq2-9qax ZoneMinder is a free, open source Closed-circuit television software application. In WWW/AJAX/watch.php, Line: 51 takes a few parameter in sql query without sanitizing it which makes it vulnerable to sql injection. This vulnerability is fixed in 1.36.34. CVE-2023-41884
VCID-8uu9-g2r8-nyep Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 while editing an existing monitor field named "signal check color" (monitor.php). There exists no input validation or output filtration, leaving it vulnerable to HTML Injection and an XSS attack. CVE-2019-7331
VCID-8vh1-pk4c-63hz A stored-self XSS exists in web/skins/classic/views/zones.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a crafted Zone NAME to the index.php?view=zones&action=zoneImage&mid=1 URI. CVE-2019-6990
VCID-95ub-6q5w-p3cm ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain an OS Command Injection via daemonControl() in (/web/api/app/Controller/HostController.php). Any authenticated user can construct an api command to execute any shell command as the web user. This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26039
VCID-9kh5-715y-pud4 ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. CVE-2022-39290
VCID-9rr3-tdb4-1kdm ZoneMinder version <= 1.32.2 contains a Other/Unknown vulnerability in User-controlled parameter that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution. CVE-2018-1000832
VCID-aqfu-4m9a-hbd4 A Cross-Site Scripting (XSS) was discovered in ZoneMinder before 1.30.2. The vulnerability exists due to insufficient filtration of user-supplied data (postLoginQuery) passed to the "ZoneMinder-master/web/skins/classic/views/js/postlogin.js.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. CVE-2017-7203
VCID-cccj-wgfh-3fg4 An issue was discovered in ZoneMinder v1.32.3. Reflected XSS exists in web/skins/classic/views/plugin.php via the zm/index.php?view=plugin pl parameter. CVE-2019-6777
VCID-ce64-m9xt-wkec ZoneMinder 1.23.3 on Fedora 10 sets the ownership of /etc/zm.conf to the apache user account, and sets the permissions to 0600, which makes it easier for remote attackers to modify this file by accessing it through a (1) PHP or (2) CGI script. CVE-2008-6755
VCID-d117-rhnc-rkhf ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Injection vulnerability. The (blind) SQL Injection vulnerability is present within the `filter[Query][terms][0][attr]` query string parameter of the `/zm/index.php` endpoint. A user with the View or Edit permissions of Events may execute arbitrary SQL. The resulting impact can include unauthorized data access (and modification), authentication and/or authorization bypass, and remote code execution. CVE-2023-26034
VCID-dk87-j5dz-6bed Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) via /js/frame.js.php because proper filtration is omitted. CVE-2019-7328
VCID-dp5c-4aaa-uyaq A file disclosure and inclusion vulnerability exists in web/views/file.php in ZoneMinder 1.x through v1.30.0 because of unfiltered user-input being passed to readfile(), which allows an authenticated attacker to read local system files (e.g., /etc/passwd) in the context of the web server user (www-data). The attack vector is a .. (dot dot) in the path parameter within a zm/index.php?view=file&path= request. CVE-2017-5595
VCID-dpp2-3t2d-d3e4 A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username. CVE-2019-6991
VCID-dz5v-tqce-a7ew Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'eid' (aka Event ID) parameter value in the view download (download.php) because proper filtration is omitted. CVE-2019-7332
VCID-edec-sj6n-n7d7 Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'log' as it insecurely prints the 'Log Message' value on the web page without applying any proper filtration. This relates to the view=logs value. CVE-2019-7335
VCID-f9wt-f98j-ekeh Cross-site scripting (XSS) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the path info to index.php. CVE-2016-10202
VCID-fnhr-cs7k-gkeu POST - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'level' parameter value in the view log (log.php) because proper filtration is omitted. CVE-2019-7339
VCID-fyy1-fwys-xkbj ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via /web/index.php. By controlling $view, any local file ending in .php can be executed. This is supposed to be mitigated by calling detaintPath, however dentaintPath does not properly sandbox the path. This can be exploited by constructing paths like "..././", which get replaced by "../". This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26036
VCID-g1r5-fbsj-n3dr A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI. CVE-2019-6992
VCID-hpah-sv5y-8bde Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page. CVE-2019-13072
VCID-j283-1m9p-13hn ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 are vulnerable to Cross-site Scripting. Log entries can be injected into the database logs, containing a malicious referrer field. This is unescaped when viewing the logs in the web ui. This issue is patched in version 1.36.33. CVE-2023-25825
VCID-jmdh-m4ty-gqch Reflected - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[LinkedMonitors]' parameter value in the view monitor (monitor.php) because proper filtration is omitted. CVE-2019-7341
VCID-jukn-h868-5ugm ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue. CVE-2022-39291
VCID-kgpe-97pr-suee Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Host' parameter value in the view console (console.php) because proper filtration is omitted. This relates to the index.php?view=monitor Host Name field. CVE-2019-7326
VCID-kk5d-y2z8-r3g2 ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability. CVE-2022-29806
VCID-mdkd-vmcp-afa8 ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61. CVE-2024-43360
VCID-mk5h-586t-pyga ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via web/ajax/modal.php, where an arbitrary php file path can be passed in the request and loaded. This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26038
VCID-mx9e-1cur-mqfz Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30 and v1.29, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server via the /events URI. CVE-2016-10140
VCID-myxu-h49e-77f1 In csrf-magic before 1.0.4, if $GLOBALS['csrf']['secret'] is not configured, the Anti-CSRF Token used is predictable and would permit an attacker to bypass the CSRF protections, because an automatically generated secret is not used. CVE-2013-7464
VCID-n8y3-5fb9-kucb ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain SQL Injection via malicious jason web token. The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL. This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26032
VCID-p916-xnk3-rkce A Time-of-check Time-of-use (TOCTOU) Race Condition exists in ZoneMinder through 1.32.3 as a session remains active for an authenticated user even after deletion from the users table. This allows a nonexistent user to access and modify records (add/delete Monitors, Users, etc.). CVE-2019-7347
VCID-pr1z-g8aw-tqez Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, as the form action on multiple views utilizes $_SERVER['PHP_SELF'] insecurely, mishandling any arbitrary input appended to the webroot URL, without any proper filtration, leading to XSS. CVE-2019-7329
VCID-qb3h-yn1c-m3cx zoneminder: command injection via unescaped php exec() calls CVE-2008-1381
VCID-qcxm-vr2w-6ka7 Buffer overflow in the zms script in ZoneMinder before 1.19.2 may allow a remote attacker to execute arbitrary code via a long query string. CVE-2004-0227
VCID-qn8h-k43x-p7cs Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'show' parameter value in the view frame (frame.php) because proper filtration is omitted. CVE-2019-7330
VCID-qs2j-ektc-2kf9 skins/classic/views/controlcap.php in ZoneMinder before 1.32.3 has XSS via the newControl array, as demonstrated by the newControl[MinTiltRange] parameter. CVE-2019-8426
VCID-qxmt-szsx-y7a8 Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'group' as it insecurely prints the 'Group Name' value on the web page without applying any proper filtration. CVE-2019-7338
VCID-qxtk-taxx-1kde Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'username' parameter value in the view user (user.php) because proper filtration is omitted. CVE-2019-7348
VCID-r3pj-815v-uubu Cross Site Scripting (XSS) vulnerability in ZoneMinder before version 1.34.21, allows remote attackers execute arbitrary code, escalate privileges, and obtain sensitive information via PHP_SELF component in classic/views/download.php. CVE-2020-25730
VCID-r4zz-6j52-cue5 Cross-site scripting (XSS) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the name when creating a new monitor. CVE-2016-10203
VCID-r751-csse-zuaq ZoneMinder version <= 1.32.2 contains a Other/Unknown vulnerability in User-controlled parameter that can result in Disclosure of confidential data, denial of service, SSRF, remote code execution. CVE-2018-1000833
VCID-rdyb-mgsn-gyb5 ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others). CVE-2017-5368
VCID-sdf7-gmgd-pkf8 Session fixation vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack web sessions via the ZMSESSID cookie. CVE-2016-10205
VCID-t5fd-hvgs-sue7 Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration. CVE-2019-7337
VCID-tj5u-pm5u-4ug6 includes/functions.php in ZoneMinder Video Server 1.24.0, 1.25.0, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) runState parameter in the packageControl function; or (2) key or (3) command parameter in the setDeviceStatusX10 function. CVE-2013-0232
VCID-tyu6-8h17-8yh5 ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain an SQL Injection. The minTime and maxTime request parameters are not properly validated and could be used execute arbitrary SQL. This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26037
VCID-ug2b-2eg5-jfbb Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[V4LCapturesPerFrame]' parameter value in the view monitor (monitor.php) because proper filtration is omitted. CVE-2019-7349
VCID-ukjs-5za3-xqdb Reflected XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'filter' as it insecurely prints the 'filter[Name]' (aka Filter name) value on the web page without applying any proper filtration. CVE-2019-7344
VCID-uybk-r4q9-gyac ZoneMinder is a free, open source Closed-circuit television software application. In affected versions the ZoneMinder API Exposes Database Log contents to user without privileges, allows insertion, modification, deletion of logs without System Privileges. Users are advised yo upgrade as soon as possible. Users unable to upgrade should disable database logging. CVE-2022-39289
VCID-v56x-raf9-kydq ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php sort parameter. CVE-2019-8424
VCID-w96c-3tde-d7b1 SQL injection vulnerability in Zoneminder 1.30 and earlier allows remote attackers to execute arbitrary SQL commands via the limit parameter in a log query request to index.php. CVE-2016-10204
VCID-wdng-puzu-5kah Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'scale' parameter value in the view frame (frame.php) because proper filtration is omitted. CVE-2019-7327
VCID-xj45-xv47-ruhe A CSRF check issue exists in ZoneMinder through 1.32.3 as whenever a CSRF check fails, a callback function is called displaying a "Try again" button, which allows resending the failed request, making the CSRF attack successful. CVE-2019-7346
VCID-y3vt-x7b1-4yer Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view export (export.php) because proper filtration is omitted. CVE-2019-7334
VCID-ys4w-ngmr-mbh9 Cross-site scripting (XSS) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the format parameter in a download log request to index.php. CVE-2016-10201
VCID-yxpy-5fmj-cbb7 ZoneMinder before 1.34.21 has XSS via the connkey parameter to download.php or export.php. CVE-2020-25729
VCID-zd7k-6rwb-qug5 Unspecified "Command Injection" vulnerability in ZoneMinder 1.23.3 and earlier allows remote attackers to execute arbitrary commands via (1) the executeFilter function in zm_html_view_events.php and (2) the run_state parameter to zm_html_view_state.php. CVE-2008-3882
VCID-zu3w-apm5-8bdw Cross-site request forgery (CSRF) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack the authentication of users for requests that change passwords and possibly have unspecified other impact as demonstrated by a crafted user action request to index.php. CVE-2016-10206

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:26:12.905701+00:00 Debian Importer Fixing VCID-8uu9-g2r8-nyep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:54.165447+00:00 Debian Importer Fixing VCID-dk87-j5dz-6bed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:15:09.296054+00:00 Debian Importer Fixing VCID-3zrk-nztf-nqfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:34.306644+00:00 Debian Importer Fixing VCID-v56x-raf9-kydq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:58.147061+00:00 Debian Importer Fixing VCID-qn8h-k43x-p7cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:23.212603+00:00 Debian Importer Fixing VCID-619e-k5cr-nyap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:01:52.566924+00:00 Debian Importer Fixing VCID-mx9e-1cur-mqfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:56:33.015852+00:00 Debian Importer Fixing VCID-64wa-wgn6-nub8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:44:57.491909+00:00 Debian Importer Fixing VCID-aqfu-4m9a-hbd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:36:10.013448+00:00 Debian Importer Fixing VCID-5ba3-bxk1-pbht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:34:03.954660+00:00 Debian Importer Fixing VCID-35hj-x1e2-eug1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:23:17.726544+00:00 Debian Importer Fixing VCID-ug2b-2eg5-jfbb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:20:50.593528+00:00 Debian Importer Fixing VCID-g1r5-fbsj-n3dr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:54.153296+00:00 Debian Importer Fixing VCID-7x1r-12y1-ekfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:19.321277+00:00 Debian Importer Fixing VCID-zu3w-apm5-8bdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:28.778704+00:00 Debian Importer Fixing VCID-xj45-xv47-ruhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:43.907768+00:00 Debian Importer Fixing VCID-kgpe-97pr-suee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:38.330055+00:00 Debian Importer Fixing VCID-ys4w-ngmr-mbh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:46.776202+00:00 Debian Importer Fixing VCID-qxtk-taxx-1kde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:34.185843+00:00 Debian Importer Fixing VCID-11zt-rw3z-87gx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:40:32.241942+00:00 Debian Importer Fixing VCID-r4zz-6j52-cue5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:21.409104+00:00 Debian Importer Fixing VCID-dz5v-tqce-a7ew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:06.419199+00:00 Debian Importer Fixing VCID-1b3u-17mt-5qfe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:26:51.019173+00:00 Debian Importer Fixing VCID-4zbd-b8b7-tfa4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:57.326384+00:00 Debian Importer Fixing VCID-t5fd-hvgs-sue7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:14:27.758245+00:00 Debian Importer Fixing VCID-578u-3ew5-qyh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:32.374082+00:00 Debian Importer Fixing VCID-r751-csse-zuaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:58:50.098369+00:00 Debian Importer Fixing VCID-sdf7-gmgd-pkf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:48.051964+00:00 Debian Importer Fixing VCID-8vh1-pk4c-63hz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:35.452119+00:00 Debian Importer Fixing VCID-23ug-uzth-tybf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:17.170885+00:00 Debian Importer Fixing VCID-643r-dxjk-63d2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:56.287788+00:00 Debian Importer Fixing VCID-zd7k-6rwb-qug5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:25.250299+00:00 Debian Importer Fixing VCID-ukjs-5za3-xqdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:14.838630+00:00 Debian Importer Fixing VCID-pr1z-g8aw-tqez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:15.204827+00:00 Debian Importer Fixing VCID-dpp2-3t2d-d3e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:40.554151+00:00 Debian Importer Fixing VCID-9rr3-tdb4-1kdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:58.096171+00:00 Debian Importer Fixing VCID-r3pj-815v-uubu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:01.780876+00:00 Debian Importer Fixing VCID-w96c-3tde-d7b1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:16:44.489784+00:00 Debian Importer Fixing VCID-p916-xnk3-rkce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:01.036739+00:00 Debian Importer Fixing VCID-694p-mbsg-e7f6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:30.427782+00:00 Debian Importer Fixing VCID-dp5c-4aaa-uyaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:08.652134+00:00 Debian Importer Fixing VCID-6xnz-k4kg-eqhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:32.709923+00:00 Debian Importer Fixing VCID-ce64-m9xt-wkec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:13.266810+00:00 Debian Importer Fixing VCID-qcxm-vr2w-6ka7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:26.958973+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:21.849180+00:00 Debian Importer Fixing VCID-y3vt-x7b1-4yer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:32.218716+00:00 Debian Importer Fixing VCID-yxpy-5fmj-cbb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:05.337893+00:00 Debian Importer Fixing VCID-fnhr-cs7k-gkeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:43.866642+00:00 Debian Importer Fixing VCID-6mdb-h6fb-c7d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:49.197405+00:00 Debian Importer Fixing VCID-f9wt-f98j-ekeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:14:05.462169+00:00 Debian Importer Fixing VCID-wdng-puzu-5kah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:26.319631+00:00 Debian Importer Fixing VCID-cccj-wgfh-3fg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:10.129167+00:00 Debian Importer Fixing VCID-edec-sj6n-n7d7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:58.883799+00:00 Debian Importer Fixing VCID-qs2j-ektc-2kf9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:44.748271+00:00 Debian Importer Fixing VCID-rdyb-mgsn-gyb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:11.398622+00:00 Debian Importer Fixing VCID-hpah-sv5y-8bde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:32.876596+00:00 Debian Importer Fixing VCID-tj5u-pm5u-4ug6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:21.469002+00:00 Debian Importer Fixing VCID-qb3h-yn1c-m3cx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:26.172538+00:00 Debian Importer Fixing VCID-qxmt-szsx-y7a8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:23.505707+00:00 Debian Importer Fixing VCID-jmdh-m4ty-gqch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:16:08.719661+00:00 Debian Importer Fixing VCID-8uu9-g2r8-nyep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:26.766779+00:00 Debian Importer Fixing VCID-dk87-j5dz-6bed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:30.830670+00:00 Debian Importer Fixing VCID-3zrk-nztf-nqfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:56.264004+00:00 Debian Importer Fixing VCID-v56x-raf9-kydq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:59:42.329779+00:00 Debian Importer Fixing VCID-qn8h-k43x-p7cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:46.886486+00:00 Debian Importer Fixing VCID-619e-k5cr-nyap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:24.241637+00:00 Debian Importer Fixing VCID-mx9e-1cur-mqfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:53:21.354673+00:00 Debian Importer Fixing VCID-64wa-wgn6-nub8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:44:33.700519+00:00 Debian Importer Fixing VCID-aqfu-4m9a-hbd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:58.790359+00:00 Debian Importer Fixing VCID-5ba3-bxk1-pbht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:36:26.609993+00:00 Debian Importer Fixing VCID-35hj-x1e2-eug1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:34.885096+00:00 Debian Importer Fixing VCID-ug2b-2eg5-jfbb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:52.294519+00:00 Debian Importer Fixing VCID-g1r5-fbsj-n3dr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:23.667550+00:00 Debian Importer Fixing VCID-7x1r-12y1-ekfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:54.699006+00:00 Debian Importer Fixing VCID-zu3w-apm5-8bdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:52.099363+00:00 Debian Importer Fixing VCID-xj45-xv47-ruhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:14.855088+00:00 Debian Importer Fixing VCID-kgpe-97pr-suee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:09.438688+00:00 Debian Importer Fixing VCID-ys4w-ngmr-mbh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:03:33.224612+00:00 Debian Importer Fixing VCID-qxtk-taxx-1kde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:21.373818+00:00 Debian Importer Fixing VCID-11zt-rw3z-87gx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:15.999733+00:00 Debian Importer Fixing VCID-r4zz-6j52-cue5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:39.051054+00:00 Debian Importer Fixing VCID-dz5v-tqce-a7ew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:32.731358+00:00 Debian Importer Fixing VCID-1b3u-17mt-5qfe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:57.610144+00:00 Debian Importer Fixing VCID-4zbd-b8b7-tfa4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:01.986341+00:00 Debian Importer Fixing VCID-t5fd-hvgs-sue7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:38.304176+00:00 Debian Importer Fixing VCID-578u-3ew5-qyh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:31.596513+00:00 Debian Importer Fixing VCID-r751-csse-zuaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:59.511755+00:00 Debian Importer Fixing VCID-sdf7-gmgd-pkf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:02.935782+00:00 Debian Importer Fixing VCID-8vh1-pk4c-63hz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:15.224781+00:00 Debian Importer Fixing VCID-23ug-uzth-tybf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:13.747092+00:00 Debian Importer Fixing VCID-643r-dxjk-63d2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:50.956733+00:00 Debian Importer Fixing VCID-zd7k-6rwb-qug5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:04.770576+00:00 Debian Importer Fixing VCID-ukjs-5za3-xqdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:56.739839+00:00 Debian Importer Fixing VCID-pr1z-g8aw-tqez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:49.694497+00:00 Debian Importer Fixing VCID-dpp2-3t2d-d3e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:44.865270+00:00 Debian Importer Fixing VCID-9rr3-tdb4-1kdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:42.277823+00:00 Debian Importer Fixing VCID-r3pj-815v-uubu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:47.452052+00:00 Debian Importer Fixing VCID-w96c-3tde-d7b1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:54.486742+00:00 Debian Importer Fixing VCID-p916-xnk3-rkce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:07.734812+00:00 Debian Importer Fixing VCID-694p-mbsg-e7f6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:12.083979+00:00 Debian Importer Fixing VCID-dp5c-4aaa-uyaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:54.601605+00:00 Debian Importer Fixing VCID-6xnz-k4kg-eqhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:15.259061+00:00 Debian Importer Fixing VCID-ce64-m9xt-wkec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:04.163510+00:00 Debian Importer Fixing VCID-qcxm-vr2w-6ka7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:16.061646+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:40.132198+00:00 Debian Importer Fixing VCID-y3vt-x7b1-4yer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:05.412266+00:00 Debian Importer Fixing VCID-yxpy-5fmj-cbb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:19.578224+00:00 Debian Importer Fixing VCID-fnhr-cs7k-gkeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:34.310007+00:00 Debian Importer Fixing VCID-6mdb-h6fb-c7d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:44.469257+00:00 Debian Importer Fixing VCID-f9wt-f98j-ekeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:35.719779+00:00 Debian Importer Fixing VCID-wdng-puzu-5kah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:03.376613+00:00 Debian Importer Fixing VCID-cccj-wgfh-3fg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:11.873108+00:00 Debian Importer Fixing VCID-edec-sj6n-n7d7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:04.624051+00:00 Debian Importer Fixing VCID-qs2j-ektc-2kf9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:20.725539+00:00 Debian Importer Fixing VCID-rdyb-mgsn-gyb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:47.226587+00:00 Debian Importer Fixing VCID-hpah-sv5y-8bde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:25.503795+00:00 Debian Importer Fixing VCID-tj5u-pm5u-4ug6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:57.578194+00:00 Debian Importer Fixing VCID-qb3h-yn1c-m3cx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:40.581776+00:00 Debian Importer Fixing VCID-qxmt-szsx-y7a8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:03.908452+00:00 Debian Importer Fixing VCID-jmdh-m4ty-gqch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:59:20.027256+00:00 Debian Importer Fixing VCID-1b3u-17mt-5qfe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.987617+00:00 Debian Importer Fixing VCID-mdkd-vmcp-afa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.954658+00:00 Debian Importer Fixing VCID-3xuk-942c-kkbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.921266+00:00 Debian Importer Fixing VCID-4mfm-zzrx-6ffb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.887550+00:00 Debian Importer Fixing VCID-7x51-uyq2-9qax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.844742+00:00 Debian Importer Fixing VCID-95ub-6q5w-p3cm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.808110+00:00 Debian Importer Fixing VCID-mk5h-586t-pyga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.771932+00:00 Debian Importer Fixing VCID-tyu6-8h17-8yh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.735336+00:00 Debian Importer Fixing VCID-fyy1-fwys-xkbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.698307+00:00 Debian Importer Fixing VCID-4qtk-7myx-vfcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.660337+00:00 Debian Importer Fixing VCID-d117-rhnc-rkhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.622409+00:00 Debian Importer Fixing VCID-n8y3-5fb9-kucb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.585419+00:00 Debian Importer Fixing VCID-j283-1m9p-13hn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.546698+00:00 Debian Importer Fixing VCID-jukn-h868-5ugm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.494118+00:00 Debian Importer Fixing VCID-9kh5-715y-pud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.441926+00:00 Debian Importer Fixing VCID-uybk-r4q9-gyac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.389814+00:00 Debian Importer Fixing VCID-7vc9-wfjb-t3ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.316777+00:00 Debian Importer Fixing VCID-kk5d-y2z8-r3g2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.259940+00:00 Debian Importer Fixing VCID-r3pj-815v-uubu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.218841+00:00 Debian Importer Fixing VCID-yxpy-5fmj-cbb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.165200+00:00 Debian Importer Fixing VCID-35hj-x1e2-eug1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.106488+00:00 Debian Importer Fixing VCID-qs2j-ektc-2kf9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:19.047777+00:00 Debian Importer Fixing VCID-v56x-raf9-kydq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.988220+00:00 Debian Importer Fixing VCID-23ug-uzth-tybf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.918144+00:00 Debian Importer Fixing VCID-ug2b-2eg5-jfbb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.870341+00:00 Debian Importer Fixing VCID-qxtk-taxx-1kde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.822291+00:00 Debian Importer Fixing VCID-p916-xnk3-rkce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.774257+00:00 Debian Importer Fixing VCID-xj45-xv47-ruhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.725860+00:00 Debian Importer Fixing VCID-3zrk-nztf-nqfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.678167+00:00 Debian Importer Fixing VCID-ukjs-5za3-xqdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.630309+00:00 Debian Importer Fixing VCID-6xnz-k4kg-eqhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.582237+00:00 Debian Importer Fixing VCID-6mdb-h6fb-c7d6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.534063+00:00 Debian Importer Fixing VCID-jmdh-m4ty-gqch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.486743+00:00 Debian Importer Fixing VCID-7x1r-12y1-ekfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.439535+00:00 Debian Importer Fixing VCID-fnhr-cs7k-gkeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.393012+00:00 Debian Importer Fixing VCID-qxmt-szsx-y7a8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.341550+00:00 Debian Importer Fixing VCID-t5fd-hvgs-sue7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.292769+00:00 Debian Importer Fixing VCID-5ba3-bxk1-pbht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.244992+00:00 Debian Importer Fixing VCID-edec-sj6n-n7d7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.197273+00:00 Debian Importer Fixing VCID-y3vt-x7b1-4yer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.149492+00:00 Debian Importer Fixing VCID-11zt-rw3z-87gx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.101334+00:00 Debian Importer Fixing VCID-dz5v-tqce-a7ew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.053755+00:00 Debian Importer Fixing VCID-8uu9-g2r8-nyep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:18.006234+00:00 Debian Importer Fixing VCID-qn8h-k43x-p7cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.958761+00:00 Debian Importer Fixing VCID-pr1z-g8aw-tqez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.911840+00:00 Debian Importer Fixing VCID-dk87-j5dz-6bed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.864601+00:00 Debian Importer Fixing VCID-wdng-puzu-5kah https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.817623+00:00 Debian Importer Fixing VCID-kgpe-97pr-suee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.770879+00:00 Debian Importer Fixing VCID-4zbd-b8b7-tfa4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.723119+00:00 Debian Importer Fixing VCID-g1r5-fbsj-n3dr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.675061+00:00 Debian Importer Fixing VCID-dpp2-3t2d-d3e4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.626801+00:00 Debian Importer Fixing VCID-8vh1-pk4c-63hz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.578734+00:00 Debian Importer Fixing VCID-cccj-wgfh-3fg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.525113+00:00 Debian Importer Fixing VCID-hpah-sv5y-8bde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.484179+00:00 Debian Importer Fixing VCID-r751-csse-zuaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.437933+00:00 Debian Importer Fixing VCID-9rr3-tdb4-1kdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.389652+00:00 Debian Importer Fixing VCID-aqfu-4m9a-hbd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.342117+00:00 Debian Importer Fixing VCID-dp5c-4aaa-uyaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.295469+00:00 Debian Importer Fixing VCID-rdyb-mgsn-gyb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.248358+00:00 Debian Importer Fixing VCID-694p-mbsg-e7f6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.200421+00:00 Debian Importer Fixing VCID-zu3w-apm5-8bdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.153148+00:00 Debian Importer Fixing VCID-sdf7-gmgd-pkf8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.105994+00:00 Debian Importer Fixing VCID-w96c-3tde-d7b1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.059189+00:00 Debian Importer Fixing VCID-r4zz-6j52-cue5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:17.012215+00:00 Debian Importer Fixing VCID-f9wt-f98j-ekeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.965358+00:00 Debian Importer Fixing VCID-ys4w-ngmr-mbh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.917350+00:00 Debian Importer Fixing VCID-mx9e-1cur-mqfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.868210+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.826472+00:00 Debian Importer Fixing VCID-578u-3ew5-qyh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.776513+00:00 Debian Importer Fixing VCID-tj5u-pm5u-4ug6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.726996+00:00 Debian Importer Fixing VCID-64wa-wgn6-nub8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.686001+00:00 Debian Importer Fixing VCID-ce64-m9xt-wkec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.637036+00:00 Debian Importer Fixing VCID-zd7k-6rwb-qug5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.588295+00:00 Debian Importer Fixing VCID-619e-k5cr-nyap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.541245+00:00 Debian Importer Fixing VCID-643r-dxjk-63d2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.492303+00:00 Debian Importer Fixing VCID-qb3h-yn1c-m3cx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:16.443053+00:00 Debian Importer Fixing VCID-qcxm-vr2w-6ka7 https://security-tracker.debian.org/tracker/data/json 38.1.0