Search for packages
Package details: pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
Next non-vulnerable version 9.2.5+ds-0+deb12u2
Latest non-vulnerable version 9.2.5+ds-0+deb12u2
Risk 4.1
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-4wv5-y778-cydd
Aliases:
CVE-2024-53868
Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-5x4y-yahm-hqaw
Aliases:
CVE-2023-38522
Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-68w5-p8ud-eybj
Aliases:
CVE-2025-49763
ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-6mqf-nqvk-yyhn
Aliases:
CVE-2024-35161
Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-76av-km9w-7fhk
Aliases:
CVE-2024-56195
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-9nex-8kjb-9kaz
Aliases:
CVE-2024-38311
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-ba1k-fjyk-jbet
Aliases:
CVE-2024-56202
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-dn7e-xgnt-sbcm
Aliases:
CVE-2025-31698
ACL configured in ip_allow.config or remap.config does not use IP addresses that are provided by PROXY protocol. Users can use a new setting (proxy.config.acl.subjects) to choose which IP addresses to use for the ACL if Apache Traffic Server is configured to accept PROXY protocol.  This issue affects undefined: from 10.0.0 through 10.0.6, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-sm56-1ey8-r3b3
Aliases:
CVE-2024-35296
Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-suuy-3kv9-2kag
Aliases:
CVE-2024-50305
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-thb6-77ut-xuau
Aliases:
CVE-2024-38479
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
VCID-wxpd-r9sw-pqhx
Aliases:
CVE-2024-50306
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
9.2.5+ds-0+deb12u2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (39)
Vulnerability Summary Aliases
VCID-1384-m5b5-kfgm Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. CVE-2019-9518
VCID-1623-q9mw-qkc2 Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions CVE-2023-30631
VCID-1mub-9jpj-nuej Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2022-25763
VCID-1u9n-4qyv-cudw Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue. CVE-2023-41752
VCID-1x8w-cfex-6fdb ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected. CVE-2020-17509
VCID-4cuz-ksaf-z7ag Improper input validation vulnerability on the range header in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1. CVE-2022-47185
VCID-5574-wvcw-zqbg Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2021-37150
VCID-55zz-76x5-1bfe Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1. CVE-2023-33934
VCID-5f8u-pckr-5ugu Stack-based Buffer Overflow vulnerability in cachekey plugin of Apache Traffic Server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. CVE-2021-35474
VCID-5pgq-hc51-5ff7 Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. CVE-2021-32565
VCID-6shr-eztc-63az Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2. CVE-2022-31778
VCID-87rc-69g5-ebh1 security update CVE-2020-1944
VCID-8dtu-bnhz-t3bx Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread. CVE-2020-9494
VCID-amxh-2y3v-xqbf Improper Authentication vulnerability in TLS origin validation of Apache Traffic Server allows an attacker to create a man in the middle attack. This issue affects Apache Traffic Server 8.0.0 to 8.1.0. CVE-2021-44759
VCID-bcpe-g3wj-bqhr Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. CVE-2019-9515
VCID-bk2k-t8d5-b3dh There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding. Upgrade to versions 7.1.9 and 8.0.6 or later versions. CVE-2019-17565
VCID-bk58-3p66-4yag There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and scheme parsing. Upgrade to versions 7.1.9 and 8.0.6 or later versions. CVE-2019-17559
VCID-bqyr-6khj-zbf9 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0. CVE-2022-47184
VCID-brww-7prv-rydz Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3. CVE-2022-32749
VCID-c5he-2rr6-3ya6 Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2022-37392
VCID-ew5n-vyu2-ukc4 Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1. CVE-2021-44040
VCID-eyq1-cdd9-33c6 Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. CVE-2021-32567
VCID-g1xx-wvz8-ukg4 Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8. CVE-2021-38161
VCID-g4bx-u7nw-subv Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions CVE-2023-33933
VCID-gffq-t1mg-b7fw security update CVE-2020-9481
VCID-gfpv-cw2e-nbd7 Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. CVE-2021-27577
VCID-gfwa-frtw-xbcv Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. CVE-2021-37147
VCID-gt9k-nahq-aya5 Improper Input Validation vulnerability in HTTP/2 header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2022-31779
VCID-me6s-51mr-tfdn Improper Input Validation vulnerability in HTTP/2 frame handling of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2022-31780
VCID-scny-ufj7-3fdz Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1. CVE-2021-37148
VCID-sz9t-h6aa-hbaj Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. CVE-2022-28129
VCID-u8xm-xx38-wudj Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. CVE-2021-37149
VCID-w5uu-nj7c-wka6 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. CVE-2023-44487
GHSA-qppj-fm5r-hxr3
VSV00013
VCID-wv7u-zn1z-nufa Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. CVE-2019-9514
GHSA-39qc-96h7-956f
VCID-xdzj-wa93-yube security update CVE-2019-10079
VCID-xj6f-2a2u-wbge The ATS ESI plugin has a memory disclosure vulnerability. If you are running the plugin please upgrade. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected. CVE-2020-17508
VCID-xrq2-n48r-v3fv Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. CVE-2021-32566
VCID-xuk6-2n6t-37e1 Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. CVE-2019-9512
GHSA-hgr8-6h9x-f7q9
VCID-z1pr-vv51-gqae HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue. CVE-2024-31309

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T19:23:43.062573+00:00 Debian Oval Importer Fixing VCID-eyq1-cdd9-33c6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:10:48.146976+00:00 Debian Oval Importer Fixing VCID-ew5n-vyu2-ukc4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:18:43.335681+00:00 Debian Oval Importer Fixing VCID-w5uu-nj7c-wka6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:02:29.304939+00:00 Debian Oval Importer Fixing VCID-sz9t-h6aa-hbaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:46:42.252737+00:00 Debian Oval Importer Fixing VCID-1x8w-cfex-6fdb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:34:33.169990+00:00 Debian Oval Importer Fixing VCID-g1xx-wvz8-ukg4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:29:25.753519+00:00 Debian Oval Importer Fixing VCID-55zz-76x5-1bfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:18:06.341444+00:00 Debian Oval Importer Fixing VCID-8dtu-bnhz-t3bx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:18:02.108310+00:00 Debian Oval Importer Fixing VCID-1384-m5b5-kfgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:01:19.110973+00:00 Debian Oval Importer Fixing VCID-gfwa-frtw-xbcv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:58:38.093670+00:00 Debian Oval Importer Fixing VCID-gffq-t1mg-b7fw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:48:31.130370+00:00 Debian Oval Importer Fixing VCID-xj6f-2a2u-wbge https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:47:37.909064+00:00 Debian Oval Importer Fixing VCID-bcpe-g3wj-bqhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:36:35.108243+00:00 Debian Oval Importer Fixing VCID-gt9k-nahq-aya5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:32.003720+00:00 Debian Oval Importer Affected by VCID-5x4y-yahm-hqaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:11.248409+00:00 Debian Oval Importer Fixing VCID-bk2k-t8d5-b3dh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:33:19.755519+00:00 Debian Oval Importer Affected by VCID-thb6-77ut-xuau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:14:25.122253+00:00 Debian Oval Importer Fixing VCID-amxh-2y3v-xqbf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:01:36.499317+00:00 Debian Oval Importer Fixing VCID-6shr-eztc-63az https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:43:42.045026+00:00 Debian Oval Importer Fixing VCID-bk58-3p66-4yag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:33:48.853122+00:00 Debian Oval Importer Fixing VCID-xuk6-2n6t-37e1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:29:51.643263+00:00 Debian Oval Importer Fixing VCID-u8xm-xx38-wudj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:27:24.590276+00:00 Debian Oval Importer Affected by VCID-6mqf-nqvk-yyhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:23:35.098416+00:00 Debian Oval Importer Fixing VCID-1623-q9mw-qkc2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:17:31.297916+00:00 Debian Oval Importer Fixing VCID-1u9n-4qyv-cudw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:16:47.273753+00:00 Debian Oval Importer Affected by VCID-sm56-1ey8-r3b3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:13:29.923972+00:00 Debian Oval Importer Fixing VCID-g4bx-u7nw-subv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:12:11.381539+00:00 Debian Oval Importer Fixing VCID-87rc-69g5-ebh1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:03:24.230697+00:00 Debian Oval Importer Fixing VCID-bqyr-6khj-zbf9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:44:14.963521+00:00 Debian Oval Importer Fixing VCID-c5he-2rr6-3ya6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:21:35.636157+00:00 Debian Importer Affected by VCID-9nex-8kjb-9kaz https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:21:01.449325+00:00 Debian Oval Importer Fixing VCID-gfpv-cw2e-nbd7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:18:53.224866+00:00 Debian Oval Importer Fixing VCID-5pgq-hc51-5ff7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:15:42.415584+00:00 Debian Importer Affected by VCID-68w5-p8ud-eybj https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T13:10:58.451504+00:00 Debian Oval Importer Fixing VCID-4cuz-ksaf-z7ag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:10:00.970800+00:00 Debian Oval Importer Fixing VCID-me6s-51mr-tfdn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:00:37.346543+00:00 Debian Oval Importer Fixing VCID-z1pr-vv51-gqae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:58:29.785503+00:00 Debian Importer Affected by VCID-suuy-3kv9-2kag https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:55:01.309652+00:00 Debian Oval Importer Fixing VCID-xrq2-n48r-v3fv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:53:05.283931+00:00 Debian Oval Importer Fixing VCID-wv7u-zn1z-nufa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:46:02.845907+00:00 Debian Oval Importer Fixing VCID-5f8u-pckr-5ugu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:45:52.574264+00:00 Debian Importer Affected by VCID-4wv5-y778-cydd https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:43:01.590089+00:00 Debian Importer Affected by VCID-ba1k-fjyk-jbet https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:41:19.314794+00:00 Debian Oval Importer Fixing VCID-1mub-9jpj-nuej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:40:44.145723+00:00 Debian Oval Importer Fixing VCID-brww-7prv-rydz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:40:16.894795+00:00 Debian Importer Affected by VCID-76av-km9w-7fhk https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:38:37.847595+00:00 Debian Oval Importer Fixing VCID-xdzj-wa93-yube https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:21:35.617851+00:00 Debian Importer Affected by VCID-dn7e-xgnt-sbcm https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-08-01T12:12:32.554570+00:00 Debian Oval Importer Fixing VCID-5574-wvcw-zqbg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:10:56.324778+00:00 Debian Oval Importer Fixing VCID-scny-ufj7-3fdz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:48:39.250076+00:00 Debian Oval Importer Affected by VCID-wxpd-r9sw-pqhx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0