Debian Security Vulnerabilities (CVEs)
Track 1,877 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2019-14586 is a use-after-free vulnerability in EDK II firmware that could allow an authenticated attacker with adjacent network access to execute...
Nov 23, 2020CVE-2019-14563 is an integer truncation vulnerability in EDK II (UEFI firmware) that allows authenticated local users to potentially escalate privileg...
Nov 23, 2020This vulnerability in PDFResurrect before version 0.20 allows attackers to cause a heap buffer overflow via specially crafted PDF files due to insuffi...
Nov 20, 2020This CVE describes a stack-based buffer overflow vulnerability in ImageMagick's XPM image processing function. Attackers can exploit this by crafting ...
Nov 20, 2020CVE-2020-28948 is a deserialization vulnerability in Archive_Tar that allows attackers to execute arbitrary code via PHAR archive exploitation. The vu...
Nov 19, 2020CVE-2019-20933 is an authentication bypass vulnerability in InfluxDB where JWT tokens with empty shared secrets are incorrectly accepted as valid. Thi...
Nov 19, 2020CVE-2020-26217 is a remote code execution vulnerability in XStream that allows attackers to execute arbitrary shell commands by manipulating processed...
Nov 16, 2020This PostgreSQL vulnerability allows man-in-the-middle attacks when client applications reuse basic connection parameters while dropping security para...
Nov 16, 2020CVE-2020-25074 is a directory traversal vulnerability in MoinMoin's cache action that allows attackers who can upload attachments to execute arbitrary...
Nov 10, 2020CVE-2017-18926 is a heap-based buffer overflow vulnerability in Raptor RDF Syntax Library's XML writer component. It allows attackers to execute arbit...
Nov 6, 2020CVE-2020-25592 is an authentication bypass vulnerability in SaltStack Salt's REST API (salt-netapi) that allows attackers to execute arbitrary command...
Nov 6, 2020CVE-2020-17510 is an authentication bypass vulnerability in Apache Shiro when used with Spring. A specially crafted HTTP request can bypass authentica...
Nov 5, 2020CVE-2020-8037 is a memory allocation vulnerability in tcpdump's PPP decapsulator that allows attackers to trigger excessive memory consumption through...
Nov 4, 2020This vulnerability is a use-after-free memory corruption flaw in Google Chrome's printing component. It allows remote attackers to potentially execute...
Nov 3, 2020This vulnerability in Chrome's ANGLE graphics engine allows attackers to potentially exploit heap corruption through a malicious HTML page. It affects...
Nov 3, 2020This vulnerability in Google Chrome's installer allows a local attacker to potentially elevate privileges by exploiting insufficient data validation w...
Nov 3, 2020This vulnerability in Chrome's V8 JavaScript engine allows attackers to execute arbitrary code through heap corruption by tricking users into visiting...
Nov 3, 2020This is a use-after-free vulnerability in WebRTC component of Google Chrome that could allow a remote attacker to trigger heap corruption via a crafte...
Nov 3, 2020This vulnerability is a use-after-free flaw in Chrome's autofill feature that allows an attacker who has already compromised the renderer process to p...
Nov 3, 2020This vulnerability in Google Chrome allows a remote attacker who has already compromised the renderer process to bypass the same-origin policy via a c...
Nov 3, 2020This vulnerability is an out-of-bounds write in Chrome's V8 JavaScript engine that allows remote attackers to potentially exploit heap corruption via ...
Nov 3, 2020This CVE describes a heap buffer overflow vulnerability in the Freetype font rendering library used by Google Chrome. A remote attacker could exploit ...
Nov 3, 2020This vulnerability is a use-after-free memory corruption flaw in Chrome's media component that allows remote attackers to execute arbitrary code or ca...
Nov 3, 2020This integer overflow vulnerability in Chrome's Blink rendering engine allows attackers to bypass site isolation protections. Attackers can craft mali...
Nov 3, 2020This is a use-after-free vulnerability in WebXR (Extended Reality) implementation in Google Chrome on Android. It allows a remote attacker to potentia...
Nov 3, 2020This vulnerability allows a remote attacker who has already compromised Chrome's renderer process to bypass navigation restrictions on Android devices...
Nov 3, 2020This vulnerability allows a local attacker on Android devices to bypass Chrome's navigation restrictions using specially crafted Intents. It affects G...
Nov 3, 2020This vulnerability allows a local attacker on ChromeOS devices to bypass Content Security Policy (CSP) protections by exploiting insufficient data val...
Nov 3, 2020This is a use-after-free vulnerability in Chrome's payments component that allows a remote attacker to potentially escape the browser sandbox via a cr...
Nov 3, 2020This vulnerability is a use-after-free memory corruption flaw in Chrome's WebRTC component. It allows remote attackers to potentially execute arbitrar...
Nov 3, 2020This is a use-after-free vulnerability in Google Chrome's printing component that allows a remote attacker who has already compromised the renderer pr...
Nov 3, 2020This vulnerability in WordPress allows authenticated users with author-level permissions to delete arbitrary files on the server due to improper valid...
Nov 2, 2020This vulnerability in Wireshark's GQUIC protocol dissector allows attackers to cause a denial-of-service crash by sending specially crafted network pa...
Nov 2, 2020CVE-2020-28032 is a critical deserialization vulnerability in WordPress that allows remote code execution. It affects WordPress sites before version 5...
Nov 2, 2020CVE-2020-28035 is a privilege escalation vulnerability in WordPress that allows attackers to gain administrative access via XML-RPC. This affects Word...
Nov 2, 2020This vulnerability in WordPress allows attackers to trigger a fresh installation on an already installed WordPress site, potentially leading to remote...
Nov 2, 2020CVE-2020-15238 is an argument injection vulnerability in Blueman's D-Bus interface that allows local attackers to execute arbitrary commands with elev...
Oct 27, 2020This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could exploit...
Oct 22, 2020This vulnerability in Xen hypervisor allows x86 guest OS users to corrupt AMD IOMMU page-table entries during partial updates, potentially leading to ...
Oct 22, 2020CVE-2020-27672 is a race condition vulnerability in Xen hypervisor that leads to use-after-free with superpages. This allows x86 guest OS users to cau...
Oct 22, 2020This vulnerability in fastd (a VPN daemon) allows denial of service through an assertion failure when receiving packets with invalid type codes. Attac...
Oct 22, 2020CVE-2020-9948 is a type confusion vulnerability in Safari's WebKit engine that allows malicious web content to trigger memory corruption. Successful e...
Oct 16, 2020CVE-2020-27153 is a double-free vulnerability in BlueZ's gatttool disconnect_cb() function that allows remote attackers to potentially cause denial of...
Oct 15, 2020This CVE describes a use-after-free vulnerability in the Android kernel's binder driver due to improper locking. It allows local attackers to escalate...
Oct 14, 2020This SQL injection vulnerability in phpMyAdmin's search feature allows attackers to inject malicious SQL queries. It affects all phpMyAdmin installati...
Oct 10, 2020This vulnerability in Wireshark's TCP dissector allows remote attackers to cause a denial of service (crash) by sending specially crafted TCP packets ...
Oct 6, 2020This vulnerability in the Linux kernel's HDLC_PPP module allows memory corruption and read overflow due to improper input validation in the ppp_cp_par...
Oct 6, 2020CVE-2020-15673 is a memory corruption vulnerability in Mozilla Firefox, Thunderbird, and Firefox ESR that could allow attackers to execute arbitrary c...
Oct 1, 2020This is a use-after-free vulnerability in Firefox, Thunderbird, and Firefox ESR that occurs when processing graphical layers during scrolling. An atta...
Oct 1, 2020CVE-2020-15227 is a code injection vulnerability in Nette PHP framework that allows attackers to execute arbitrary code by passing specially crafted p...
Oct 1, 2020Why Monitor Debian Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,877+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.
Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Debian CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions