Search for packages
Package details: pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
purl pkg:deb/debian/nss@2:3.14.5-1%2Bdeb7u5
Next non-vulnerable version 2:3.110-1
Latest non-vulnerable version 2:3.110-1
Risk 7.2
Vulnerabilities affecting this package (56)
Vulnerability Summary Fixed by
VCID-1msn-8tvt-ekhd
Aliases:
CVE-2015-7182
Mozilla engineers Tyson Smith and David Keeler reported a use-after-poison and buffer overflow in the ASN.1 decoder in Network Security Services (NSS). These issues were in octet string parsing and were found through fuzzing and code inspection. If these issues were triggered, they would lead to a potentially exploitable crash. These issues were fixed in NSS version 3.19.2.1 and 3.19.4, shipped in Firefox and Firefox ESR, respectively, as well as NSS 3.20.1.Google security engineer Ryan Sleevi reported an integer overflow in the Netscape Portable Runtime (NSPR) due to a lack of checks during memory allocation. This leads to a potentially exploitable crash. This issue is fixed in NSPR 4.10.10. The NSPR library is a required component of NSS.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-1xgw-uan4-byhg
Aliases:
CVE-2021-43527
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-1zaj-dhug-bffr
Aliases:
CVE-2024-0743
An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-4532-9e5v-5ybj
Aliases:
CVE-2013-1739
Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.In general these flaws cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-4b2y-apw2-pbe4
Aliases:
CVE-2014-1491
Mozilla developer Brian Smith and security researchers Antoine Delignat-Lavaud and Karthikeyan Bhargavan of the Prosecco research team at INRIA Paris reported issues with ticket handling in the Network Security Services (NSS) libraries. These have been addressed in the NSS 3.15.4 release, shipping on affected platforms.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-54s7-rrtw-a7cg
Aliases:
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. We would like to thank Sohaib ul Hassan for contributing a fix for this issue as well.*Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-6gvr-zjz7-5uh5
Aliases:
CVE-2017-5461
An out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
2:3.26.2-1.1+deb9u1
Affected by 25 other vulnerabilities.
VCID-77de-35ta-1kat
Aliases:
CVE-2024-6609
When almost out-of-memory an elliptic curve key which was never allocated could have been freed again.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-7nbe-kj5s-q7cn
Aliases:
CVE-2016-8635
It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-7s8d-r67g-6feh
Aliases:
CVE-2024-6602
A mismatch between allocator and deallocator could have led to memory corruption.
2:3.87.1-1+deb12u1
Affected by 3 other vulnerabilities.
VCID-7svy-v5cp-u3fd
Aliases:
CVE-2015-7575
Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks. This issue was fixed in NSS version 3.20.2.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-8yk7-za7y-9bd5
Aliases:
CVE-2014-1490
Mozilla developer Brian Smith and security researchers Antoine Delignat-Lavaud and Karthikeyan Bhargavan of the Prosecco research team at INRIA Paris reported issues with ticket handling in the Network Security Services (NSS) libraries. These have been addressed in the NSS 3.15.4 release, shipping on affected platforms.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-92g9-rvdj-ukbx
Aliases:
CVE-2013-5605
Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-a22c-wks1-3ubx
Aliases:
CVE-2020-12413
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-ake6-cm2x-8ubs
Aliases:
CVE-2019-11745
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-arv7-nfbr-dfc1
Aliases:
CVE-2015-2721
Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where the client allows for a ECDHE_ECDSA exchange where the server does not send its ServerKeyExchange message instead of aborting the handshake. Instead, the NSS client will take the EC key from the ECDSA certificate. This violates the TLS protocol and also has some security implications for forward secrecy. In this situation, the browser thinks it is engaged in an ECDHE exchange, but has been silently downgraded to a non-forward secret mixed-ECDH exchange instead. As a result, if False Start is enabled, the browser will start sending data encrypted under these non-forward-secret connection keys. This issue was fixed in NSS version 3.19.1.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-axss-jrt6-qqdk
Aliases:
CVE-2020-25648
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-ay74-3btx-p3dt
Aliases:
CVE-2016-1938
Security researcher Hanno Böck reported that calculations with mp_div and mp_exptmod in Network Security Services (NSS) can produce wrong results in some circumstances. These functions are used within NSS for a variety of cryptographic division functions, leading to potential cryptographic weaknesses.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-bjhc-gzeg-vyhq
Aliases:
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-c5su-4v3n-5qh4
Aliases:
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-e8wz-a6j9-ybas
Aliases:
CVE-2020-12399
NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-esvq-px6q-uubw
Aliases:
CVE-2015-7181
Mozilla engineers Tyson Smith and David Keeler reported a use-after-poison and buffer overflow in the ASN.1 decoder in Network Security Services (NSS). These issues were in octet string parsing and were found through fuzzing and code inspection. If these issues were triggered, they would lead to a potentially exploitable crash. These issues were fixed in NSS version 3.19.2.1 and 3.19.4, shipped in Firefox and Firefox ESR, respectively, as well as NSS 3.20.1.Google security engineer Ryan Sleevi reported an integer overflow in the Netscape Portable Runtime (NSPR) due to a lack of checks during memory allocation. This leads to a potentially exploitable crash. This issue is fixed in NSPR 4.10.10. The NSPR library is a required component of NSS.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-ex9u-mprs-bqfe
Aliases:
CVE-2018-18508
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-hn37-qn3a-k3hz
Aliases:
CVE-2014-1492
Security researcher Christian Heimes reported that the Network Security Services (NSS) library does not handle IDNA domain prefixes according to RFC 6125 for wildcard certificates. This leads to improper wildcard matching of domains when they should not be matched in compliance with the specification. This issue was fixed in NSS version 3.16.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-hvj7-bwkf-f3em
Aliases:
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-jgeh-zksd-vucm
Aliases:
CVE-2013-1741
Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-k6c2-t5dn-6fcj
Aliases:
CVE-2013-1740
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-knng-vugd-z7dn
Aliases:
CVE-2014-1569
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-m67w-mzaf-duch
Aliases:
CVE-2014-3566
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-mahw-y94d-xbe6
Aliases:
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-mn9u-s9ed-tyde
Aliases:
CVE-2015-2730
Mozilla community member Watson Ladd reported that the implementation of Elliptical Curve Cryptography (ECC) multiplication for Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation in Network Security Services (NSS) did not handle exceptional cases correctly. This could potentially allow for signature forgery. This issue was fixed in NSS version 3.19.1.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-mpbx-48aw-rbh2
Aliases:
CVE-2014-1544
Security researchers Tyson Smith and Jesse Schwartzentruber used the Address Sanitizer tool while fuzzing to discover a use-after-free error resulting in a crash. This is a result of a pair of NSSCertificate structures being added to a trust domain and then one of them is removed while they are still in use by the trusted cache. This crash is potentially exploitable. This issue was addressed in the Network Security Services (NSS) library in version 3.16.2, shipping on affected platforms.In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-n7zq-kjfr-kfd3
Aliases:
CVE-2016-1950
Security researcher Francis Gabriel of Quarkslab reported a heap-based buffer overflow in the way the Network Security Services (NSS) libraries parsed certain ASN.1 structures. An attacker could create a specially-crafted certificate which, when parsed by NSS, would cause it to crash or execute arbitrary code with the permissions of the user. This issue has been addressed in the NSS releases shipping on affected Mozilla products:
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-n8eb-ba65-jbas
Aliases:
CVE-2016-5285
A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-nzee-g5hm-pfca
Aliases:
CVE-2018-12384
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-p3hm-nxch-a7hd
Aliases:
CVE-2013-5606
Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5.
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-p65t-d156-qfex
Aliases:
CVE-2017-5462
A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
2:3.26.2-1.1+deb9u1
Affected by 25 other vulnerabilities.
VCID-pjmh-gvqz-47et
Aliases:
CVE-2023-4421
The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-pphb-ty98-tkgx
Aliases:
CVE-2016-1979
Mozilla developer Tim Taubert used the Address Sanitizer tool and software fuzzing to discover a use-after-free vulnerability while processing DER encoded keys in the Network Security Services (NSS) libraries. The vulnerability overwrites the freed memory with zeroes. This issue has been addressed in NSS 3.21.1, shipping in Firefox 45.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-sm4b-5vw1-1qcf
Aliases:
CVE-2019-17023
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-sv69-65sj-vybj
Aliases:
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-tbc7-h4xz-rkdq
Aliases:
CVE-2017-7502
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
2:3.26.2-1.1+deb9u1
Affected by 25 other vulnerabilities.
VCID-tkkj-f8ww-1kdn
Aliases:
CVE-2020-12403
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-tpju-q2sh-rbck
Aliases:
CVE-2015-4000
Security researcher Matthew Green reported a Diffie–Hellman (DHE) key processing issue in Network Security Services (NSS) where a man-in-the-middle (MITM) attacker can force a server to downgrade TLS connections to 512-bit export-grade cryptography by modifying client requests to include only export-grade cipher suites. The resulting weak key can then be leveraged to impersonate the server. This attack is detailed in the "Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice" paper and is known as the "Logjam Attack."This issue was fixed in NSS version 3.19.1 by limiting the lower strength of supported DHE keys to use 1023 bit primes.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-tpw7-f1vk-3bf4
Aliases:
CVE-2016-1978
Mozilla developer Eric Rescorla reported that a failed allocation during DHE and ECDHE handshakes would lead to a use-after-free vulnerability.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-u6nu-186u-auh1
Aliases:
CVE-2014-1568
Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, reported an issue in Network Security Services (NSS) libraries affecting all versions. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates.The Advanced Threat Research team at Intel Security also independently discovered and reported this issue.These have been addressed in the NSS releases shipping on affected Mozilla products:
2:3.17.2-1.1
Affected by 43 other vulnerabilities.
VCID-ubzm-vaec-93gp
Aliases:
CVE-2022-22747
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-vme5-mkru-k3aj
Aliases:
CVE-2019-17007
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-w27h-8fnv-guhx
Aliases:
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-wqhe-hmdh-p7eq
Aliases:
CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
2:3.26.2-1.1+deb9u1
Affected by 25 other vulnerabilities.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-x6ny-uzze-23ap
Aliases:
CVE-2019-17006
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-yqjn-5kut-6qbk
Aliases:
CVE-2023-0767
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
2:3.61-1+deb11u3
Affected by 5 other vulnerabilities.
VCID-z4fk-gp2d-g3d8
Aliases:
CVE-2016-9574
nss: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-z5tc-zwsb-eydp
Aliases:
CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
2:3.42.1-1+deb10u5
Affected by 21 other vulnerabilities.
VCID-zx73-18cf-pkaw
Aliases:
CVE-2016-2834
Mozilla has updated the version of Network Security Services (NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated networking security issues reported by Mozilla engineers Tyson Smith and Jed Davis.
2:3.26-1+debu8u3
Affected by 29 other vulnerabilities.
VCID-zxmj-tzr9-c3cy
Aliases:
CVE-2016-9074
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1.
2:3.26.2-1.1+deb9u1
Affected by 25 other vulnerabilities.
Vulnerabilities fixed by this package (18)
Vulnerability Summary Aliases
VCID-4532-9e5v-5ybj Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.In general these flaws cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts. CVE-2013-1739
VCID-4b2y-apw2-pbe4 Mozilla developer Brian Smith and security researchers Antoine Delignat-Lavaud and Karthikeyan Bhargavan of the Prosecco research team at INRIA Paris reported issues with ticket handling in the Network Security Services (NSS) libraries. These have been addressed in the NSS 3.15.4 release, shipping on affected platforms. CVE-2014-1491
VCID-4bt4-mzvr-gff7 CVE-2013-0169
VCID-92g9-rvdj-ukbx Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5. CVE-2013-5605
VCID-ak7k-umpb-kkg5 CVE-2013-1620
VCID-arv7-nfbr-dfc1 Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where the client allows for a ECDHE_ECDSA exchange where the server does not send its ServerKeyExchange message instead of aborting the handshake. Instead, the NSS client will take the EC key from the ECDSA certificate. This violates the TLS protocol and also has some security implications for forward secrecy. In this situation, the browser thinks it is engaged in an ECDHE exchange, but has been silently downgraded to a non-forward secret mixed-ECDH exchange instead. As a result, if False Start is enabled, the browser will start sending data encrypted under these non-forward-secret connection keys. This issue was fixed in NSS version 3.19.1. CVE-2015-2721
VCID-gfdm-frg9-37fd Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash. CVE-2013-0791
VCID-hbwd-7s88-dyfn SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) CVE-2016-0800
VCID-hn37-qn3a-k3hz Security researcher Christian Heimes reported that the Network Security Services (NSS) library does not handle IDNA domain prefixes according to RFC 6125 for wildcard certificates. This leads to improper wildcard matching of domains when they should not be matched in compliance with the specification. This issue was fixed in NSS version 3.16. CVE-2014-1492
VCID-jg6h-xzwd-wbhk Security researcher Kaspar Brand found a flaw in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. Effects of this issue depend on the field. One known symptom is an unexploitable crash in handling OCSP responses. NSS also mishandles zero-length basic constraints, assuming default values for some types that should be rejected as malformed. These issues have been addressed in NSS 3.13.4, which is now being used by Mozilla. CVE-2012-0441
VCID-jgeh-zksd-vucm Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5. CVE-2013-1741
VCID-knng-vugd-z7dn CVE-2014-1569
VCID-ksnr-v863-xuf1 CVE-2011-3389
VCID-mn9u-s9ed-tyde Mozilla community member Watson Ladd reported that the implementation of Elliptical Curve Cryptography (ECC) multiplication for Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation in Network Security Services (NSS) did not handle exceptional cases correctly. This could potentially allow for signature forgery. This issue was fixed in NSS version 3.19.1. CVE-2015-2730
VCID-mpbx-48aw-rbh2 Security researchers Tyson Smith and Jesse Schwartzentruber used the Address Sanitizer tool while fuzzing to discover a use-after-free error resulting in a crash. This is a result of a pair of NSSCertificate structures being added to a trust domain and then one of them is removed while they are still in use by the trusted cache. This crash is potentially exploitable. This issue was addressed in the Network Security Services (NSS) library in version 3.16.2, shipping on affected platforms.In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts. CVE-2014-1544
VCID-p3hm-nxch-a7hd Mozilla has updated the version of Network Security Services (NSS) library used in Mozilla projects to NSS 3.15.3 with the exception of ESR17-based releases, which have been updated to NSS 3.14.5. This addresses several moderate to critical rated networking security issues.Google developer Andrew Tinits reported a potentially exploitable buffer overflow that was fixed in both NSS 3.15.3 and NSS 3.14.5. CVE-2013-5606
VCID-tsqy-v4ek-cbfy nss: /pkcs11.txt and /secmod.db files read on initialization CVE-2011-3640
VCID-u6nu-186u-auh1 Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, reported an issue in Network Security Services (NSS) libraries affecting all versions. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates.The Advanced Threat Research team at Intel Security also independently discovered and reported this issue.These have been addressed in the NSS releases shipping on affected Mozilla products: CVE-2014-1568

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:15:04.804693+00:00 Debian Oval Importer Affected by VCID-wqhe-hmdh-p7eq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T20:07:27.612909+00:00 Debian Oval Importer Affected by VCID-c5su-4v3n-5qh4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:54:15.569656+00:00 Debian Oval Importer Affected by VCID-1xgw-uan4-byhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:50:45.724351+00:00 Debian Oval Importer Fixing VCID-ksnr-v863-xuf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:47:09.883156+00:00 Debian Oval Importer Affected by VCID-7s8d-r67g-6feh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:42:38.880965+00:00 Debian Oval Importer Affected by VCID-p65t-d156-qfex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:18:26.165609+00:00 Debian Oval Importer Affected by VCID-p3hm-nxch-a7hd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:36:23.567677+00:00 Debian Oval Importer Affected by VCID-tpju-q2sh-rbck https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:34:50.611170+00:00 Debian Oval Importer Fixing VCID-ak7k-umpb-kkg5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:17:45.949074+00:00 Debian Oval Importer Affected by VCID-tpw7-f1vk-3bf4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:16:39.101722+00:00 Debian Oval Importer Affected by VCID-knng-vugd-z7dn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:03:29.025546+00:00 Debian Oval Importer Affected by VCID-n8eb-ba65-jbas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:54:18.835589+00:00 Debian Oval Importer Affected by VCID-ake6-cm2x-8ubs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:53:18.619559+00:00 Debian Oval Importer Affected by VCID-bjhc-gzeg-vyhq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:52:38.634703+00:00 Debian Oval Importer Affected by VCID-tkkj-f8ww-1kdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:49:38.866945+00:00 Debian Oval Importer Affected by VCID-a22c-wks1-3ubx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:40:44.550938+00:00 Debian Oval Importer Affected by VCID-pphb-ty98-tkgx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:37:24.966402+00:00 Debian Oval Importer Affected by VCID-1msn-8tvt-ekhd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:32:31.131580+00:00 Debian Oval Importer Fixing VCID-4bt4-mzvr-gff7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:27:53.235417+00:00 Debian Oval Importer Affected by VCID-tbc7-h4xz-rkdq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:17:05.090918+00:00 Debian Oval Importer Affected by VCID-arv7-nfbr-dfc1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:09:03.933454+00:00 Debian Oval Importer Affected by VCID-e8wz-a6j9-ybas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:47:43.034610+00:00 Debian Oval Importer Affected by VCID-m67w-mzaf-duch https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:46:34.968968+00:00 Debian Oval Importer Affected by VCID-n7zq-kjfr-kfd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:44:08.485326+00:00 Debian Oval Importer Affected by VCID-k6c2-t5dn-6fcj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:36:15.645836+00:00 Debian Oval Importer Affected by VCID-sm4b-5vw1-1qcf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:36:13.595978+00:00 Debian Oval Importer Affected by VCID-z4fk-gp2d-g3d8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:34.140625+00:00 Debian Oval Importer Affected by VCID-mahw-y94d-xbe6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:17:53.614932+00:00 Debian Oval Importer Affected by VCID-ubzm-vaec-93gp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:59:43.517252+00:00 Debian Oval Importer Affected by VCID-nzee-g5hm-pfca https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:53:11.878131+00:00 Debian Oval Importer Affected by VCID-1zaj-dhug-bffr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:43:48.472356+00:00 Debian Oval Importer Affected by VCID-ex9u-mprs-bqfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:35:56.789674+00:00 Debian Oval Importer Affected by VCID-vme5-mkru-k3aj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:10.555733+00:00 Debian Oval Importer Affected by VCID-8yk7-za7y-9bd5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:27:33.754178+00:00 Debian Oval Importer Affected by VCID-4532-9e5v-5ybj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:26:05.418686+00:00 Debian Oval Importer Affected by VCID-92g9-rvdj-ukbx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:25:41.955516+00:00 Debian Oval Importer Affected by VCID-zxmj-tzr9-c3cy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:10:19.101333+00:00 Debian Oval Importer Affected by VCID-77de-35ta-1kat https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:00:46.438115+00:00 Debian Oval Importer Affected by VCID-z5tc-zwsb-eydp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:50:02.407350+00:00 Debian Oval Importer Affected by VCID-6gvr-zjz7-5uh5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:33:16.227614+00:00 Debian Oval Importer Affected by VCID-hn37-qn3a-k3hz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:30:06.851287+00:00 Debian Oval Importer Affected by VCID-esvq-px6q-uubw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:21:45.727620+00:00 Debian Oval Importer Affected by VCID-7svy-v5cp-u3fd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:18:23.818679+00:00 Debian Oval Importer Fixing VCID-hbwd-7s88-dyfn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:16:19.721894+00:00 Debian Oval Importer Fixing VCID-tsqy-v4ek-cbfy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:15:14.688597+00:00 Debian Oval Importer Affected by VCID-sv69-65sj-vybj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:13:19.327133+00:00 Debian Oval Importer Affected by VCID-mpbx-48aw-rbh2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:59:13.688111+00:00 Debian Oval Importer Fixing VCID-gfdm-frg9-37fd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:57:30.974563+00:00 Debian Oval Importer Affected by VCID-jgeh-zksd-vucm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:56:48.304555+00:00 Debian Oval Importer Affected by VCID-hvj7-bwkf-f3em https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:53:25.403332+00:00 Debian Oval Importer Affected by VCID-zx73-18cf-pkaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:50:09.990346+00:00 Debian Oval Importer Affected by VCID-yqjn-5kut-6qbk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:39:00.424445+00:00 Debian Oval Importer Affected by VCID-x6ny-uzze-23ap https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:38:29.049049+00:00 Debian Oval Importer Affected by VCID-4b2y-apw2-pbe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:37:57.247768+00:00 Debian Oval Importer Affected by VCID-u6nu-186u-auh1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:26:56.708759+00:00 Debian Oval Importer Affected by VCID-7nbe-kj5s-q7cn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:16:55.795965+00:00 Debian Oval Importer Affected by VCID-w27h-8fnv-guhx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:04:33.893616+00:00 Debian Oval Importer Affected by VCID-54s7-rrtw-a7cg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:57:46.392758+00:00 Debian Oval Importer Affected by VCID-ay74-3btx-p3dt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:51:43.743208+00:00 Debian Oval Importer Affected by VCID-axss-jrt6-qqdk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:46:59.513246+00:00 Debian Oval Importer Affected by VCID-mn9u-s9ed-tyde https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:02:43.100892+00:00 Debian Oval Importer Fixing VCID-jg6h-xzwd-wbhk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:02:09.091344+00:00 Debian Oval Importer Affected by VCID-pjmh-gvqz-47et https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:42:41.474580+00:00 Debian Oval Importer Affected by VCID-vme5-mkru-k3aj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:30:00.415016+00:00 Debian Oval Importer Affected by VCID-sm4b-5vw1-1qcf https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:26:56.400320+00:00 Debian Oval Importer Affected by VCID-x6ny-uzze-23ap https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:19:57.875696+00:00 Debian Oval Importer Affected by VCID-ake6-cm2x-8ubs https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:18:11.605781+00:00 Debian Oval Importer Affected by VCID-54s7-rrtw-a7cg https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:17:38.137133+00:00 Debian Oval Importer Affected by VCID-e8wz-a6j9-ybas https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:16:05.368663+00:00 Debian Oval Importer Affected by VCID-1xgw-uan4-byhg https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:16:01.566906+00:00 Debian Oval Importer Affected by VCID-ubzm-vaec-93gp https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T10:46:01.980786+00:00 Debian Oval Importer Affected by VCID-wqhe-hmdh-p7eq https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:25:28.248560+00:00 Debian Oval Importer Affected by VCID-mn9u-s9ed-tyde https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:23:37.921085+00:00 Debian Oval Importer Affected by VCID-tpju-q2sh-rbck https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:22:38.429210+00:00 Debian Oval Importer Affected by VCID-6gvr-zjz7-5uh5 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:21:52.708962+00:00 Debian Oval Importer Affected by VCID-tpw7-f1vk-3bf4 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:21:47.260074+00:00 Debian Oval Importer Affected by VCID-wqhe-hmdh-p7eq https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:18:51.207423+00:00 Debian Oval Importer Affected by VCID-1msn-8tvt-ekhd https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:17:45.271746+00:00 Debian Oval Importer Affected by VCID-pphb-ty98-tkgx https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:13:47.516688+00:00 Debian Oval Importer Affected by VCID-zx73-18cf-pkaw https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:10:47.935397+00:00 Debian Oval Importer Affected by VCID-7svy-v5cp-u3fd https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:10:27.216935+00:00 Debian Oval Importer Affected by VCID-p65t-d156-qfex https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:05:49.812974+00:00 Debian Oval Importer Affected by VCID-esvq-px6q-uubw https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:04:42.087199+00:00 Debian Oval Importer Affected by VCID-tbc7-h4xz-rkdq https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:03:24.646902+00:00 Debian Oval Importer Affected by VCID-ay74-3btx-p3dt https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:56:19.782517+00:00 Debian Oval Importer Affected by VCID-arv7-nfbr-dfc1 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:53:46.236595+00:00 Debian Oval Importer Affected by VCID-n7zq-kjfr-kfd3 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:46:39.515768+00:00 Debian Oval Importer Fixing VCID-knng-vugd-z7dn https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:46:11.296913+00:00 Debian Oval Importer Fixing VCID-mn9u-s9ed-tyde https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:38:11.844064+00:00 Debian Oval Importer Fixing VCID-4b2y-apw2-pbe4 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:37:11.622939+00:00 Debian Oval Importer Fixing VCID-mpbx-48aw-rbh2 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:35:51.582046+00:00 Debian Oval Importer Fixing VCID-p3hm-nxch-a7hd https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:24:16.395373+00:00 Debian Oval Importer Fixing VCID-jgeh-zksd-vucm https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:23:34.235351+00:00 Debian Oval Importer Fixing VCID-4532-9e5v-5ybj https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:22:36.930010+00:00 Debian Oval Importer Fixing VCID-arv7-nfbr-dfc1 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:21:50.070322+00:00 Debian Oval Importer Fixing VCID-92g9-rvdj-ukbx https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:21:39.154236+00:00 Debian Oval Importer Fixing VCID-hn37-qn3a-k3hz https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:20:26.561131+00:00 Debian Oval Importer Fixing VCID-u6nu-186u-auh1 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0