Debian Security Vulnerabilities (CVEs)

Track 1,475 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

198 Critical
977 High
300 Medium
🔔 Get Alerts for Debian
CVE-2022-0943 7.8

CVE-2022-0943 is a heap-based buffer overflow vulnerability in Vim text editor versions prior to 8.2.4563. Attackers can exploit this by tricking user...

Mar 14, 2022
CVE-2022-20001 7.8

This vulnerability in fish shell versions 3.1.0-3.3.1 allows arbitrary code execution when users navigate to directories containing malicious git conf...

Mar 14, 2022
CVE-2022-22719 7.5

CVE-2022-22719 is a memory corruption vulnerability in Apache HTTP Server where a specially crafted request body can cause the server to read from ran...

Mar 14, 2022
CVE-2022-22720 9.8

Apache HTTP Server versions 2.4.52 and earlier contain a vulnerability where the server fails to properly close inbound connections when encountering ...

Mar 14, 2022
CVE-2022-23943 9.8

CVE-2022-23943 is a critical heap memory corruption vulnerability in Apache HTTP Server's mod_sed module that allows attackers to write data beyond al...

Mar 14, 2022
CVE-2022-24754 8.5

CVE-2022-24754 is a stack-buffer overflow vulnerability in PJSIP multimedia communication library that affects users accepting hashed digest credentia...

Mar 11, 2022
CVE-2022-0908 7.7

This vulnerability in libtiff allows an attacker to cause denial of service by passing a null pointer to memcpy() when processing specially crafted TI...

Mar 11, 2022
CVE-2020-36518 7.5

CVE-2020-36518 is a denial-of-service vulnerability in Jackson Databind where processing deeply nested JSON objects causes a Java StackOverflowError, ...

Mar 11, 2022
CVE-2022-23036 7.0

Multiple race condition vulnerabilities in Linux PV device frontends allow malicious Xen backends to maintain unauthorized access to guest memory page...

Mar 10, 2022
CVE-2022-23038 7.0

This CVE (CVE-2022-23038) is part of a series of vulnerabilities affecting Linux PV device frontends in Xen virtualization. It allows malicious or com...

Mar 10, 2022
CVE-2022-23040 7.0

Multiple race condition vulnerabilities in Linux PV device frontends allow malicious Xen backends to maintain unauthorized access to guest memory page...

Mar 10, 2022
CVE-2022-23042 7.0

CVE-2022-23042 is a race condition vulnerability in Linux Xen PV netfront driver where a malicious backend can trigger a BUG_ON() assertion failure, c...

Mar 10, 2022
CVE-2022-26846 8.8

This vulnerability allows remote authenticated editors in SPIP content management systems to execute arbitrary code on the server. It affects SPIP ins...

Mar 10, 2022
CVE-2022-26662 7.5

This CVE describes an XML Entity Expansion (XEE) vulnerability in Tryton Application Platform that allows unauthenticated attackers to send crafted XM...

Mar 10, 2022
CVE-2022-26520 9.8

This vulnerability in pgjdbc allows attackers who control JDBC connection parameters to write arbitrary files using Java's logging functionality. This...

Mar 10, 2022
CVE-2022-0516 7.8

A local privilege escalation vulnerability in the KVM subsystem for s390 architecture in Linux kernel allows a local attacker with normal user privile...

Mar 10, 2022
CVE-2022-0204 8.8

CVE-2022-0204 is a heap overflow vulnerability in BlueZ Bluetooth stack versions before 5.63. An attacker on the local network can send specially craf...

Mar 10, 2022
CVE-2021-33293 9.1

CVE-2021-33293 is an out-of-bounds read vulnerability in Panorama Tools libpano13 that could allow attackers to read sensitive memory contents or caus...

Mar 10, 2022
CVE-2022-24713 7.5

CVE-2022-24713 is a vulnerability in the Rust regex crate where built-in mitigations against regex-based denial of service attacks can be bypassed. Th...

Mar 8, 2022
CVE-2022-26505 7.4

CVE-2022-26505 is a DNS rebinding vulnerability in ReadyMedia (formerly MiniDLNA) that allows a malicious web server to bypass same-origin policy and ...

Mar 6, 2022
CVE-2022-26496 9.8

CVE-2022-26496 is a critical stack-based buffer overflow vulnerability in nbd-server (Network Block Device server) that allows remote attackers to exe...

Mar 6, 2022
CVE-2022-26490 7.8

This CVE describes a buffer overflow vulnerability in the Linux kernel's NFC driver (st21nfca). Attackers can exploit this by sending specially crafte...

Mar 6, 2022
CVE-2022-24921 7.5

This vulnerability in Go's regexp.Compile function allows attackers to cause a denial of service via stack exhaustion by providing a deeply nested reg...

Mar 5, 2022
CVE-2021-3640 7.0

This CVE describes a use-after-free vulnerability in the Linux kernel's Bluetooth HCI subsystem. A privileged local attacker can trigger a race condit...

Mar 3, 2022
CVE-2022-0730 9.8

CVE-2022-0730 is an authentication bypass vulnerability in Cacti that allows attackers to gain unauthorized access under specific LDAP configurations....

Mar 3, 2022
CVE-2022-21716 7.5

CVE-2022-21716 is a memory exhaustion vulnerability in Twisted's SSH client and server implementations. Attackers can send unlimited data during SSH v...

Mar 3, 2022
CVE-2022-0492 7.8

CVE-2022-0492 is a Linux kernel vulnerability in the cgroups v1 release_agent feature that allows local attackers to escalate privileges and escape co...

Mar 3, 2022
CVE-2022-23648 7.5

This vulnerability in containerd allows containers with specially-crafted image configurations to access read-only copies of arbitrary host files and ...

Mar 3, 2022
CVE-2022-0711 7.5

CVE-2022-0711 is a denial-of-service vulnerability in HAProxy where specially crafted HTTP responses containing Set-Cookie2 headers can trigger an inf...

Mar 2, 2022
CVE-2022-24720 9.8

CVE-2022-24720 is a critical command injection vulnerability in the image_processing Ruby gem that allows attackers to execute arbitrary shell command...

Mar 1, 2022
CVE-2022-23308 7.5

CVE-2022-23308 is a use-after-free vulnerability in libxml2's validation component that allows attackers to potentially execute arbitrary code or caus...

Feb 26, 2022
CVE-2022-21824 8.2

This CVE describes a prototype pollution vulnerability in Node.js's console.table() function when user-controlled input is passed to the 'properties' ...

Feb 24, 2022
CVE-2022-0545 7.8

CVE-2022-0545 is an integer overflow vulnerability in Blender's 2D image processing that allows attackers to achieve arbitrary code execution or infor...

Feb 24, 2022
CVE-2022-25636 7.8

CVE-2022-25636 is a heap out-of-bounds write vulnerability in the Linux kernel's netfilter component that allows local users to escalate privileges to...

Feb 24, 2022
CVE-2022-24407 8.8

CVE-2022-24407 is a SQL injection vulnerability in Cyrus SASL authentication library. It allows attackers to inject arbitrary SQL commands via unescap...

Feb 24, 2022
CVE-2019-25058 7.8

CVE-2019-25058 is a privilege escalation vulnerability in USBGuard versions before 1.1.0 where the usbguard-dbus daemon allows unprivileged users to m...

Feb 24, 2022
CVE-2022-0729 8.8

CVE-2022-0729 is a use-after-free vulnerability in Vim's memory handling that allows an attacker to execute arbitrary code by tricking a user into ope...

Feb 23, 2022
CVE-2022-23608 8.1

This CVE describes a use-after-free vulnerability in PJSIP library versions up to 2.11.1 that occurs in dialog set scenarios. When multiple UAC dialog...

Feb 22, 2022
CVE-2022-0685 7.8

CVE-2022-0685 is a memory corruption vulnerability in Vim text editor caused by an out-of-range pointer offset. Attackers can exploit this by tricking...

Feb 20, 2022
CVE-2016-1239 9.8

This vulnerability in duck (a software package) before version 0.10 allows arbitrary code execution by loading untrusted code from the current directo...

Feb 19, 2022
CVE-2021-20322 7.4

This Linux kernel vulnerability allows remote attackers to bypass UDP source port randomization by exploiting flaws in ICMP error processing. Attacker...

Feb 18, 2022
CVE-2021-3657 9.8

This vulnerability in mbsync allows remote attackers to execute arbitrary code by exploiting buffer overflows when processing extremely large IMAP lit...

Feb 18, 2022
CVE-2020-25717 8.1

CVE-2020-25717 is a privilege escalation vulnerability in Samba's domain user mapping mechanism. Authenticated attackers can exploit this flaw to gain...

Feb 18, 2022
CVE-2020-25719 7.2

This vulnerability in Samba's Active Directory Domain Controller allows attackers to bypass Kerberos authentication by exploiting confusion about user...

Feb 18, 2022
CVE-2022-25314 7.5

CVE-2022-25314 is an integer overflow vulnerability in Expat's copyString function that can lead to heap buffer overflow. This allows attackers to pot...

Feb 18, 2022
CVE-2022-25315 9.8

CVE-2022-25315 is an integer overflow vulnerability in Expat's storeRawNames function that can lead to heap buffer overflow. This allows attackers to ...

Feb 18, 2022
CVE-2021-44730 7.8

CVE-2021-44730 is a privilege escalation vulnerability in snapd where improper validation of the snap-confine binary location allows local attackers t...

Feb 17, 2022
CVE-2022-0629 7.8

CVE-2022-0629 is a stack-based buffer overflow vulnerability in Vim text editor versions prior to 8.2. This allows attackers to execute arbitrary code...

Feb 17, 2022
CVE-2021-43299 9.8

CVE-2021-43299 is a critical stack-based buffer overflow vulnerability in the PJSUA API of the pjproject library, triggered when calling pjsua_player_...

Feb 16, 2022
CVE-2021-43301 9.8

This is a critical stack buffer overflow vulnerability in the PJSUA API of pjproject when calling pjsua_playlist_create. An attacker can exploit this ...

Feb 16, 2022

Why Monitor Debian Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,475+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.

Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Debian CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Debian CVEs Free