Debian Security Vulnerabilities (CVEs)
Track 1,877 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
An integer overflow vulnerability in libtiff's tif_getimage.c allows attackers to execute arbitrary code when a user opens a malicious TIFF file. This...
Mar 9, 2021This is a use-after-free vulnerability in Chrome's Network Internals component on Linux systems. It allows remote attackers to potentially execute arb...
Mar 9, 2021This is a use-after-free vulnerability in Chrome's Blink rendering engine that allows remote attackers to potentially execute arbitrary code via a cra...
Mar 9, 2021This vulnerability in Google Chrome's PDFium component allows attackers to read uninitialized memory from the browser process by tricking users into o...
Mar 9, 2021This CVE describes a data race vulnerability in Google Chrome's audio component that could allow heap corruption. A remote attacker could exploit this...
Mar 9, 2021This is a use-after-free vulnerability in Google Chrome's bookmarks feature that allows remote attackers to potentially exploit heap corruption. Attac...
Mar 9, 2021This vulnerability allows a remote attacker to perform out-of-bounds memory access in Chrome's V8 JavaScript engine via a crafted HTML page. Attackers...
Mar 9, 2021This vulnerability in Google Chrome's File System API on Windows allows attackers to bypass filesystem restrictions via a malicious HTML page. It affe...
Mar 9, 2021This vulnerability in Google Chrome's Referrer implementation allowed attackers to bypass navigation restrictions via crafted HTML pages. It affects u...
Mar 9, 2021This vulnerability is a heap buffer overflow in Chrome's WebAudio component that allows remote attackers to potentially exploit heap corruption via a ...
Mar 9, 2021This vulnerability is a use-after-free memory corruption flaw in Chrome's WebRTC component that allows remote attackers to potentially execute arbitra...
Mar 9, 2021This vulnerability in Privoxy allows an attacker to cause denial of service by passing invalid patterns to the pcre_compile() function, leading to inv...
Mar 9, 2021This vulnerability in Privoxy allows remote attackers to crash the proxy server by sending a specially crafted CGI request that triggers an assertion ...
Mar 9, 2021CVE-2021-27364 is a Linux kernel vulnerability in the iSCSI subsystem that allows unprivileged local users to cause a denial of service or potentially...
Mar 7, 2021This is a critical out-of-bounds read vulnerability in CGAL's Nef polygon-parsing functionality that can lead to arbitrary code execution. Attackers c...
Mar 4, 2021CVE-2020-28601 is a critical out-of-bounds read vulnerability in CGAL's Nef polygon-parsing functionality that can lead to remote code execution. Atta...
Mar 4, 2021This vulnerability in Apache Tomcat allows HTTP/2 cleartext (h2c) connections to leak request data between users. When processing h2c requests, Tomcat...
Mar 1, 2021This vulnerability in SaltStack Salt allows expired eauth tokens to be reused once after expiration, potentially enabling attackers to execute unautho...
Feb 27, 2021This vulnerability allows remote attackers to execute arbitrary shell commands on SaltStack Salt servers via shell injection in the salt-api SSH clien...
Feb 27, 2021CVE-2020-28243 is a command injection vulnerability in SaltStack Salt's restartcheck feature that allows local privilege escalation. Any user who can ...
Feb 27, 2021This vulnerability in SaltStack Salt allows man-in-the-middle attacks by failing to properly validate SSL certificates during authentication to certai...
Feb 27, 2021This vulnerability in SaltStack Salt allows unauthenticated remote attackers to execute arbitrary wheel modules on the Salt master via salt-api. The w...
Feb 27, 2021This vulnerability allows server-side template injection (SSTI) in SaltStack Salt's Jinja renderer, enabling attackers to execute arbitrary code on Sa...
Feb 27, 2021This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could potenti...
Feb 26, 2021This vulnerability is a buffer overflow in libcaca's caca_resize function that could allow local attackers to execute arbitrary code with the privileg...
Feb 23, 2021This vulnerability in mbsync allows a malicious or compromised IMAP server to use specially crafted mailbox names containing '..' path components to a...
Feb 23, 2021CVE-2021-26120 is a critical code injection vulnerability in Smarty template engine that allows attackers to execute arbitrary PHP code via specially ...
Feb 22, 2021This vulnerability in Xen hypervisor allows x86 Intel HVM guest OS users to achieve unintended DMA access, potentially leading to host OS crashes or p...
Feb 18, 2021CVE-2020-8625 is a buffer overflow vulnerability in BIND DNS servers that affects systems configured with GSS-TSIG features. Exploitation could lead t...
Feb 17, 2021This vulnerability in Debian's avahi package allows local attackers to perform symlink attacks on files under /run/avahi-daemon. Attackers can cause d...
Feb 17, 2021This vulnerability in the Linux kernel's Xen block back-end driver (xen-blkback) can cause memory mapping errors when processing grant references from...
Feb 17, 2021This OpenSSL vulnerability involves integer overflow in cryptographic functions (EVP_CipherUpdate, EVP_EncryptUpdate, EVP_DecryptUpdate) when processi...
Feb 16, 2021CVE-2021-27219 is an integer overflow vulnerability in GNOME GLib's g_bytes_new function on 64-bit platforms, caused by an implicit cast from 64-bit t...
Feb 15, 2021This vulnerability in OpenLDAP allows remote attackers to cause a denial of service by sending a specially crafted packet with a short timestamp, trig...
Feb 14, 2021CVE-2021-21311 is a server-side request forgery (SSRF) vulnerability in Adminer database management software that allows attackers to make unauthorize...
Feb 11, 2021CVE-2021-27135 is a critical vulnerability in xterm terminal emulator that allows remote attackers to execute arbitrary code or cause denial of servic...
Feb 10, 2021CVE-2020-36244 is a critical heap-based buffer overflow vulnerability in GENIVI diagnostic log and trace (DLT) daemon that allows remote attackers to ...
Feb 10, 2021This vulnerability allows network-adjacent attackers to execute arbitrary code via a stack-based buffer overflow in ConnMan's dnsproxy component. It a...
Feb 9, 2021This vulnerability in Firejail allows attackers to bypass security restrictions through a TOCTOU race condition between stat and OverlayFS mount opera...
Feb 8, 2021CVE-2021-21289 is a command injection vulnerability in the Mechanize Ruby library that allows attackers to execute arbitrary operating system commands...
Feb 2, 2021This vulnerability in the GNU C Library's iconv function causes a program crash when processing invalid ISO-2022-JP-3 encoded input. It affects any ap...
Jan 27, 2021CVE-2021-3156 is a heap-based buffer overflow vulnerability in Sudo that allows local users to escalate privileges to root. The exploit involves using...
Jan 26, 2021This vulnerability in OpenLDAP allows attackers to cause a double-free memory corruption in the slapd daemon's saslAuthzTo processing, leading to a cr...
Jan 26, 2021This vulnerability in OpenLDAP allows attackers to trigger an infinite loop in the slapd daemon by sending a specially crafted cancel_extop Cancel ope...
Jan 26, 2021This vulnerability in OpenLDAP's X.509 DN parsing can cause the slapd daemon to crash when processing specially crafted certificates, leading to denia...
Jan 26, 2021An integer underflow vulnerability in OpenLDAP's Certificate Exact Assertion processing can cause slapd to crash, leading to denial of service. This a...
Jan 26, 2021This vulnerability in OpenLDAP's slapd daemon allows attackers to trigger a crash through malformed Values Return Filter control requests, causing den...
Jan 26, 2021This vulnerability is a heap-buffer overflow in openjpeg2's PNG file handling that allows attackers to crash applications or potentially execute arbit...
Jan 26, 2021This vulnerability is a heap-based buffer overflow in dnsmasq before version 2.83 that occurs during DNSSEC validation of RRSets. An attacker who can ...
Jan 20, 2021This vulnerability allows remote attackers to execute arbitrary code or cause denial of service via a specially crafted BMP image file. It affects app...
Jan 19, 2021Why Monitor Debian Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,877+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.
Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Debian CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions