Search for packages
Package details: pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
Next non-vulnerable version 9.2.5+ds-0+deb12u2
Latest non-vulnerable version 9.2.5+ds-0+deb12u2
Risk 10.0
Vulnerabilities affecting this package (54)
Vulnerability Summary Fixed by
VCID-1384-m5b5-kfgm
Aliases:
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-15ju-jpw8-zkcu
Aliases:
CVE-2017-5660
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-1623-q9mw-qkc2
Aliases:
CVE-2023-30631
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-1mub-9jpj-nuej
Aliases:
CVE-2022-25763
Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-1u9n-4qyv-cudw
Aliases:
CVE-2023-41752
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-1x8w-cfex-6fdb
Aliases:
CVE-2020-17509
ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-4cuz-ksaf-z7ag
Aliases:
CVE-2022-47185
Improper input validation vulnerability on the range header in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-4z9y-htvf-8bh1
Aliases:
CVE-2016-5396
7.0.0-4~bpo8+1
Affected by 51 other vulnerabilities.
VCID-529e-qjy8-1kf9
Aliases:
CVE-2018-8022
A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.
7.0.0-4~bpo8+1
Affected by 51 other vulnerabilities.
VCID-5574-wvcw-zqbg
Aliases:
CVE-2021-37150
Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-55zz-76x5-1bfe
Aliases:
CVE-2023-33934
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-5f8u-pckr-5ugu
Aliases:
CVE-2021-35474
Stack-based Buffer Overflow vulnerability in cachekey plugin of Apache Traffic Server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-5pgq-hc51-5ff7
Aliases:
CVE-2021-32565
Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-5x4y-yahm-hqaw
Aliases:
CVE-2023-38522
Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-6mqf-nqvk-yyhn
Aliases:
CVE-2024-35161
Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-6shr-eztc-63az
Aliases:
CVE-2022-31778
Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-87rc-69g5-ebh1
Aliases:
CVE-2020-1944
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-8dtu-bnhz-t3bx
Aliases:
CVE-2020-9494
Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-9txj-n8gv-gbey
Aliases:
CVE-2017-5659
7.0.0-4~bpo8+1
Affected by 51 other vulnerabilities.
VCID-aat6-pqk2-33hq
Aliases:
CVE-2018-8040
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-ach4-44jw-q7cm
Aliases:
CVE-2018-8005
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-amxh-2y3v-xqbf
Aliases:
CVE-2021-44759
Improper Authentication vulnerability in TLS origin validation of Apache Traffic Server allows an attacker to create a man in the middle attack. This issue affects Apache Traffic Server 8.0.0 to 8.1.0.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-bcpe-g3wj-bqhr
Aliases:
CVE-2019-9515
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-bk2k-t8d5-b3dh
Aliases:
CVE-2019-17565
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-bk58-3p66-4yag
Aliases:
CVE-2019-17559
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and scheme parsing. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-bqyr-6khj-zbf9
Aliases:
CVE-2022-47184
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-brww-7prv-rydz
Aliases:
CVE-2022-32749
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-c5he-2rr6-3ya6
Aliases:
CVE-2022-37392
Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-d9cm-e21m-byee
Aliases:
CVE-2018-8004
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-ew5n-vyu2-ukc4
Aliases:
CVE-2021-44040
Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-eyq1-cdd9-33c6
Aliases:
CVE-2021-32567
Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-fmrm-ykf1-6udp
Aliases:
CVE-2018-1318
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-g1xx-wvz8-ukg4
Aliases:
CVE-2021-38161
Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-g4bx-u7nw-subv
Aliases:
CVE-2023-33933
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-gffq-t1mg-b7fw
Aliases:
CVE-2020-9481
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-gfpv-cw2e-nbd7
Aliases:
CVE-2021-27577
Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-gfwa-frtw-xbcv
Aliases:
CVE-2021-37147
Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-gt9k-nahq-aya5
Aliases:
CVE-2022-31779
Improper Input Validation vulnerability in HTTP/2 header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-kck4-vy6z-fuhj
Aliases:
CVE-2017-7671
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-me6s-51mr-tfdn
Aliases:
CVE-2022-31780
Improper Input Validation vulnerability in HTTP/2 frame handling of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-scny-ufj7-3fdz
Aliases:
CVE-2021-37148
Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-sm56-1ey8-r3b3
Aliases:
CVE-2024-35296
Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-sz9t-h6aa-hbaj
Aliases:
CVE-2022-28129
Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-thb6-77ut-xuau
Aliases:
CVE-2024-38479
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-u8xm-xx38-wudj
Aliases:
CVE-2021-37149
Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-uwqf-x396-5uas
Aliases:
CVE-2018-11783
sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
VCID-w5uu-nj7c-wka6
Aliases:
CVE-2023-44487
GHSA-qppj-fm5r-hxr3
VSV00013
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-wv7u-zn1z-nufa
Aliases:
CVE-2019-9514
GHSA-39qc-96h7-956f
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-wxpd-r9sw-pqhx
Aliases:
CVE-2024-50306
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-xdzj-wa93-yube
Aliases:
CVE-2019-10079
security update
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-xj6f-2a2u-wbge
Aliases:
CVE-2020-17508
The ATS ESI plugin has a memory disclosure vulnerability. If you are running the plugin please upgrade. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-xrq2-n48r-v3fv
Aliases:
CVE-2021-32566
Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-xuk6-2n6t-37e1
Aliases:
CVE-2019-9512
GHSA-hgr8-6h9x-f7q9
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
8.0.2+ds-1+deb10u6
Affected by 44 other vulnerabilities.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
VCID-z1pr-vv51-gqae
Aliases:
CVE-2024-31309
HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.
8.1.10+ds-1~deb11u1
Affected by 12 other vulnerabilities.
Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:17:01.829748+00:00 Debian Oval Importer Fixing VCID-33ez-crma-w7cc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:57:45.918731+00:00 Debian Oval Importer Affected by VCID-15ju-jpw8-zkcu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:38:06.899571+00:00 Debian Oval Importer Fixing VCID-yg2c-58ma-8ubw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:28:50.885001+00:00 Debian Oval Importer Affected by VCID-fmrm-ykf1-6udp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:23:43.048408+00:00 Debian Oval Importer Affected by VCID-eyq1-cdd9-33c6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:10:48.132095+00:00 Debian Oval Importer Affected by VCID-ew5n-vyu2-ukc4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:18:43.321369+00:00 Debian Oval Importer Affected by VCID-w5uu-nj7c-wka6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:02:29.290350+00:00 Debian Oval Importer Affected by VCID-sz9t-h6aa-hbaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:46:42.239638+00:00 Debian Oval Importer Affected by VCID-1x8w-cfex-6fdb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:45:04.333327+00:00 Debian Oval Importer Affected by VCID-4z9y-htvf-8bh1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:40:46.631359+00:00 Debian Oval Importer Fixing VCID-qkyn-a9g6-ckbt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:40:24.293131+00:00 Debian Oval Importer Fixing VCID-1yrv-cge8-9fcb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:04:29.391187+00:00 Debian Oval Importer Affected by VCID-d9cm-e21m-byee https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:00:01.848243+00:00 Debian Oval Importer Affected by VCID-9txj-n8gv-gbey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:34:33.156697+00:00 Debian Oval Importer Affected by VCID-g1xx-wvz8-ukg4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:25.739396+00:00 Debian Oval Importer Affected by VCID-55zz-76x5-1bfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:18:53.384528+00:00 Debian Oval Importer Affected by VCID-kck4-vy6z-fuhj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:18:06.326213+00:00 Debian Oval Importer Affected by VCID-8dtu-bnhz-t3bx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:18:02.094221+00:00 Debian Oval Importer Affected by VCID-1384-m5b5-kfgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:14:38.844141+00:00 Debian Oval Importer Fixing VCID-egab-vqpz-43b9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:01:19.096963+00:00 Debian Oval Importer Affected by VCID-gfwa-frtw-xbcv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:58:38.079832+00:00 Debian Oval Importer Affected by VCID-gffq-t1mg-b7fw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:48:31.116952+00:00 Debian Oval Importer Affected by VCID-xj6f-2a2u-wbge https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:47:37.895559+00:00 Debian Oval Importer Affected by VCID-bcpe-g3wj-bqhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:36:35.093481+00:00 Debian Oval Importer Affected by VCID-gt9k-nahq-aya5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:31.989766+00:00 Debian Oval Importer Affected by VCID-5x4y-yahm-hqaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:11.235399+00:00 Debian Oval Importer Affected by VCID-bk2k-t8d5-b3dh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:33:19.741758+00:00 Debian Oval Importer Affected by VCID-thb6-77ut-xuau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:14:25.108023+00:00 Debian Oval Importer Affected by VCID-amxh-2y3v-xqbf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:01:36.485107+00:00 Debian Oval Importer Affected by VCID-6shr-eztc-63az https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:43:42.031402+00:00 Debian Oval Importer Affected by VCID-bk58-3p66-4yag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:33:48.838124+00:00 Debian Oval Importer Affected by VCID-xuk6-2n6t-37e1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:29:51.629574+00:00 Debian Oval Importer Affected by VCID-u8xm-xx38-wudj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:27:24.576489+00:00 Debian Oval Importer Affected by VCID-6mqf-nqvk-yyhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:23:48.061551+00:00 Debian Oval Importer Affected by VCID-uwqf-x396-5uas https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:23:35.083498+00:00 Debian Oval Importer Affected by VCID-1623-q9mw-qkc2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:17:31.282460+00:00 Debian Oval Importer Affected by VCID-1u9n-4qyv-cudw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:16:47.259184+00:00 Debian Oval Importer Affected by VCID-sm56-1ey8-r3b3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:13:29.909779+00:00 Debian Oval Importer Affected by VCID-g4bx-u7nw-subv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:12:11.367087+00:00 Debian Oval Importer Affected by VCID-87rc-69g5-ebh1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:09:21.642925+00:00 Debian Oval Importer Affected by VCID-529e-qjy8-1kf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:03:24.215554+00:00 Debian Oval Importer Affected by VCID-bqyr-6khj-zbf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:58:12.351233+00:00 Debian Oval Importer Fixing VCID-qgs4-na7g-ufbp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:44:14.948236+00:00 Debian Oval Importer Affected by VCID-c5he-2rr6-3ya6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:21:01.431450+00:00 Debian Oval Importer Affected by VCID-gfpv-cw2e-nbd7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:18:53.210505+00:00 Debian Oval Importer Affected by VCID-5pgq-hc51-5ff7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:18:12.878168+00:00 Debian Oval Importer Affected by VCID-ach4-44jw-q7cm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:10:58.435195+00:00 Debian Oval Importer Affected by VCID-4cuz-ksaf-z7ag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:10:00.956856+00:00 Debian Oval Importer Affected by VCID-me6s-51mr-tfdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:06:41.257624+00:00 Debian Oval Importer Affected by VCID-aat6-pqk2-33hq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:00:37.330982+00:00 Debian Oval Importer Affected by VCID-z1pr-vv51-gqae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:55:01.294280+00:00 Debian Oval Importer Affected by VCID-xrq2-n48r-v3fv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:53:05.269914+00:00 Debian Oval Importer Affected by VCID-wv7u-zn1z-nufa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:46:02.831739+00:00 Debian Oval Importer Affected by VCID-5f8u-pckr-5ugu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:41:19.299647+00:00 Debian Oval Importer Affected by VCID-1mub-9jpj-nuej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:40:44.131232+00:00 Debian Oval Importer Affected by VCID-brww-7prv-rydz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:38:37.833325+00:00 Debian Oval Importer Affected by VCID-xdzj-wa93-yube https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:12:32.540151+00:00 Debian Oval Importer Affected by VCID-5574-wvcw-zqbg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:10:56.309629+00:00 Debian Oval Importer Affected by VCID-scny-ufj7-3fdz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:48:39.231603+00:00 Debian Oval Importer Affected by VCID-wxpd-r9sw-pqhx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:46:56.212631+00:00 Debian Oval Importer Affected by VCID-gfpv-cw2e-nbd7 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:46:18.912505+00:00 Debian Oval Importer Affected by VCID-bk2k-t8d5-b3dh https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:46:10.164796+00:00 Debian Oval Importer Affected by VCID-amxh-2y3v-xqbf https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:43:48.131784+00:00 Debian Oval Importer Affected by VCID-wv7u-zn1z-nufa https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:43:37.053841+00:00 Debian Oval Importer Affected by VCID-xuk6-2n6t-37e1 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:41:19.484936+00:00 Debian Oval Importer Affected by VCID-bk58-3p66-4yag https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:39:03.414287+00:00 Debian Oval Importer Affected by VCID-1384-m5b5-kfgm https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:38:43.407517+00:00 Debian Oval Importer Affected by VCID-1x8w-cfex-6fdb https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:38:15.817494+00:00 Debian Oval Importer Affected by VCID-8dtu-bnhz-t3bx https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:35:03.560907+00:00 Debian Oval Importer Affected by VCID-u8xm-xx38-wudj https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:34:34.490638+00:00 Debian Oval Importer Affected by VCID-5f8u-pckr-5ugu https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:34:24.889233+00:00 Debian Oval Importer Affected by VCID-xj6f-2a2u-wbge https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:33:05.906132+00:00 Debian Oval Importer Affected by VCID-xrq2-n48r-v3fv https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:32:45.963561+00:00 Debian Oval Importer Affected by VCID-gffq-t1mg-b7fw https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:32:41.540523+00:00 Debian Oval Importer Affected by VCID-ew5n-vyu2-ukc4 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:26:46.570652+00:00 Debian Oval Importer Affected by VCID-5pgq-hc51-5ff7 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:21:54.998750+00:00 Debian Oval Importer Affected by VCID-scny-ufj7-3fdz https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:20:30.589516+00:00 Debian Oval Importer Affected by VCID-xdzj-wa93-yube https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:17:23.445523+00:00 Debian Oval Importer Affected by VCID-eyq1-cdd9-33c6 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:15:45.856945+00:00 Debian Oval Importer Affected by VCID-87rc-69g5-ebh1 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:14:37.058803+00:00 Debian Oval Importer Affected by VCID-bcpe-g3wj-bqhr https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:13:58.717223+00:00 Debian Oval Importer Affected by VCID-gfwa-frtw-xbcv https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:13:08.302276+00:00 Debian Oval Importer Affected by VCID-g1xx-wvz8-ukg4 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:09:54.718624+00:00 Debian Oval Importer Affected by VCID-15ju-jpw8-zkcu https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T11:08:08.350673+00:00 Debian Oval Importer Affected by VCID-kck4-vy6z-fuhj https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T11:07:45.461780+00:00 Debian Oval Importer Affected by VCID-ach4-44jw-q7cm https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:53:44.404942+00:00 Debian Oval Importer Affected by VCID-d9cm-e21m-byee https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:51:57.199494+00:00 Debian Oval Importer Affected by VCID-aat6-pqk2-33hq https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:38:40.841260+00:00 Debian Oval Importer Affected by VCID-fmrm-ykf1-6udp https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0