{"id":"DSA-1610-1","summary":"gaim - execution of arbitrary code","modified":"2026-03-09T01:17:47.520171384Z","published":"2008-07-15T00:00:00Z","upstream":["CVE-2008-2927","DEBIAN-CVE-2008-2927"],"affected":[{"package":{"name":"gaim","ecosystem":"Debian:4.0","purl":"pkg:deb/debian/gaim?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.0.0+beta5-10etch1"}]}],"versions":["1:2.0.0+beta5-10"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dsa-osv/DSA-1610-1.json"}}],"schema_version":"1.7.3"}