Debian Security Vulnerabilities (CVEs)

Track 1,426 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

188 Critical
938 High
300 Medium
🔔 Get Alerts for Debian
CVE-2023-34966 7.5

This CVE describes an infinite loop vulnerability in Samba's mdssvc RPC service for Spotlight. Attackers can send specially crafted RPC packets with a...

Jul 20, 2023
CVE-2023-35001 7.8

This vulnerability in the Linux kernel's nftables subsystem allows local users with CAP_NET_ADMIN capability to trigger out-of-bounds read/write opera...

Jul 5, 2023
CVE-2023-31248 7.8

This CVE-2023-31248 is a use-after-free vulnerability in the Linux kernel's nftables subsystem that allows local attackers to escalate privileges. The...

Jul 5, 2023
CVE-2023-37211 8.8

This CVE describes memory safety bugs in Firefox, Firefox ESR, and Thunderbird that could lead to memory corruption. With sufficient effort, attackers...

Jul 5, 2023
CVE-2023-37208 7.8

Firefox and Thunderbird failed to warn users when opening Diagcab files, which could contain malicious code. This vulnerability allows attackers to ex...

Jul 5, 2023
CVE-2023-37201 8.8

This vulnerability allows an attacker to trigger a use-after-free condition when establishing a WebRTC connection over HTTPS, potentially leading to a...

Jul 5, 2023
CVE-2023-3090 7.8

This CVE describes a heap out-of-bounds write vulnerability in the Linux Kernel's ipvlan network driver that allows local attackers to escalate privil...

Jun 28, 2023
CVE-2023-3420 8.8

This is a type confusion vulnerability in Chrome's V8 JavaScript engine that could allow an attacker to trigger heap corruption by tricking the browse...

Jun 26, 2023
CVE-2023-3422 8.8

This is a use-after-free vulnerability in Google Chrome's Guest View component that allows heap corruption. Attackers can exploit it by convincing use...

Jun 26, 2023
CVE-2023-36664 7.8

CVE-2023-36664 is a security bypass vulnerability in Artifex Ghostscript that allows arbitrary command execution through improper permission validatio...

Jun 25, 2023
CVE-2023-35823 7.0

This CVE describes a use-after-free vulnerability in the Linux kernel's saa7134 media device driver. Attackers with local access can potentially explo...

Jun 18, 2023
CVE-2023-35788 7.8

This vulnerability allows attackers to perform out-of-bounds writes in the Linux kernel's flower classifier code via specially crafted GENEVE packets....

Jun 16, 2023
CVE-2022-47184 7.5

Apache Traffic Server versions 8.0.0 through 9.2.0 contain an information disclosure vulnerability that allows unauthorized actors to access sensitive...

Jun 14, 2023
CVE-2023-3214 8.8

This critical vulnerability in Google Chrome's Autofill payments feature allows remote attackers to execute arbitrary code via heap corruption. Attack...

Jun 13, 2023
CVE-2023-3216 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that could allow a remote attacker to trigger heap corruption by tricking...

Jun 13, 2023
CVE-2023-3141 7.1

A use-after-free vulnerability in the Linux kernel's r592 memory stick host driver allows local attackers to crash the system during device disconnect...

Jun 9, 2023
CVE-2023-2603 7.8

An integer overflow vulnerability in libcap's _libcap_strdup() function allows memory corruption when processing extremely large strings (close to 4GB...

Jun 6, 2023
CVE-2023-3079 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that allows a remote attacker to trigger heap corruption by tricking the ...

Jun 5, 2023
CVE-2023-3111 7.8

A use-after-free vulnerability in the Linux kernel's Btrfs filesystem allows local attackers to potentially crash the system or execute arbitrary code...

Jun 5, 2023
CVE-2023-32067 7.5

CVE-2023-32067 is a denial-of-service vulnerability in the c-ares asynchronous DNS resolver library where an attacker can send a forged UDP packet wit...

May 25, 2023
CVE-2023-28709 7.5

This vulnerability allows attackers to bypass request size limits in Apache Tomcat by submitting exactly maxParameterCount query parameters, potential...

May 22, 2023
CVE-2023-33204 7.8

CVE-2023-33204 is an integer overflow vulnerability in sysstat's check_overflow function that could allow attackers to cause denial of service or pote...

May 18, 2023
CVE-2023-24805 8.8

CVE-2023-24805 is a command injection vulnerability in cups-filters' Backend Error Handler (beh) that allows remote code execution. Attackers with net...

May 17, 2023
CVE-2023-2721 8.8

This is a critical use-after-free vulnerability in Google Chrome's navigation component that allows remote attackers to potentially exploit heap corru...

May 16, 2023
CVE-2023-2723 8.8

This is a use-after-free vulnerability in Chrome DevTools that allows a remote attacker who has already compromised the renderer process to potentiall...

May 16, 2023
CVE-2023-2725 8.8

This is a use-after-free vulnerability in Chrome's Guest View component that allows heap corruption. Attackers can exploit it by convincing users to i...

May 16, 2023
CVE-2023-2124 7.8

A local privilege escalation vulnerability exists in the Linux kernel's XFS filesystem when restoring from a dirty log journal after failure. This all...

May 15, 2023
CVE-2023-2156 7.5

This vulnerability in the Linux kernel's RPL protocol handling allows unauthenticated remote attackers to trigger an assertion failure by sending spec...

May 9, 2023
CVE-2023-31490 7.5

A vulnerability in FRRouting's BGP daemon (bgpd) allows remote attackers to cause denial of service by sending specially crafted BGP packets that trig...

May 9, 2023
CVE-2023-31137 7.5

A remotely exploitable integer underflow vulnerability in MaraDNS allows attackers to cause Denial of Service by sending specially crafted DNS packets...

May 9, 2023
CVE-2023-2460 7.1

This vulnerability allows a malicious Chrome extension to bypass file access checks when a user visits a crafted HTML page. Attackers could potentiall...

May 3, 2023
CVE-2023-2133 8.8

This vulnerability allows remote attackers to exploit heap corruption in Google Chrome via a crafted HTML page. It affects Chrome users on any operati...

Apr 19, 2023
CVE-2023-2135 7.5

This is a use-after-free vulnerability in Chrome's DevTools that could allow heap corruption. Attackers could potentially execute arbitrary code or cr...

Apr 19, 2023
CVE-2023-2136 9.6

This vulnerability is an integer overflow in Google Chrome's Skia graphics library that allows an attacker who has already compromised the renderer pr...

Apr 19, 2023
CVE-2023-21930 7.4

This vulnerability in Oracle Java SE and GraalVM Enterprise Edition's JSSE component allows attackers to compromise confidentiality and integrity of d...

Apr 18, 2023
CVE-2023-2033 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that could allow a remote attacker to execute arbitrary code or cause hea...

Apr 14, 2023
CVE-2023-1989 7.0

A use-after-free vulnerability in the Linux kernel's Bluetooth subsystem allows local attackers to potentially execute arbitrary code or cause denial ...

Apr 11, 2023
CVE-2023-1810 8.8

This vulnerability is a heap buffer overflow in Google Chrome's Visuals component that allows a remote attacker who has already compromised the render...

Apr 4, 2023
CVE-2023-1812 8.8

This vulnerability allows a remote attacker to perform out-of-bounds memory access in Chrome's DOM Bindings by tricking a user into visiting a malicio...

Apr 4, 2023
CVE-2023-1815 8.8

This is a use-after-free vulnerability in Google Chrome's Networking APIs that allows heap corruption. Attackers can exploit it by tricking users into...

Apr 4, 2023
CVE-2023-1818 8.8

This vulnerability is a use-after-free memory corruption flaw in Chrome's Vulkan graphics implementation. It allows remote attackers to potentially ex...

Apr 4, 2023
CVE-2023-1820 8.8

A heap buffer overflow vulnerability in Google Chrome's browser history feature allows remote attackers to potentially exploit heap corruption. Attack...

Apr 4, 2023
CVE-2022-36440 7.5

This vulnerability allows attackers to cause a denial-of-service (DoS) in FRRouting's BGP daemon by sending specially crafted BGP open packets. The re...

Apr 3, 2023
CVE-2023-28879 9.8

This CVE describes a buffer overflow vulnerability in Artifex Ghostscript's PostScript interpreter that could allow attackers to corrupt internal data...

Mar 31, 2023
CVE-2022-23121 9.8

CVE-2022-23121 is a critical remote code execution vulnerability in Netatalk's AppleDouble parsing functionality. Unauthenticated attackers can exploi...

Mar 28, 2023
CVE-2022-23123 9.8

CVE-2022-23123 is a critical out-of-bounds read vulnerability in Netatalk's getdirparams method that allows unauthenticated remote attackers to read s...

Mar 28, 2023
CVE-2022-23125 9.8

CVE-2022-23125 is a critical stack-based buffer overflow vulnerability in Netatalk's copyapplfile function that allows unauthenticated remote attacker...

Mar 28, 2023
CVE-2022-0194 9.8

CVE-2022-0194 is a critical stack-based buffer overflow vulnerability in Netatalk's ad_addcomment function that allows unauthenticated remote attacker...

Mar 28, 2023
CVE-2023-1077 7.0

CVE-2023-1077 is a type confusion vulnerability in the Linux kernel's real-time scheduler that can lead to memory corruption. This allows local attack...

Mar 27, 2023
CVE-2023-1380 7.1

This CVE describes an out-of-bounds read vulnerability in the Broadcom brcmfmac WiFi driver in the Linux kernel. When processing association request d...

Mar 27, 2023

Why Monitor Debian Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,426+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.

Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Debian CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Debian CVEs Free