Debian Security Vulnerabilities (CVEs)
Track 1,917 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows remote authenticated users to upload malicious PHP files with alternative extensions (.php3, .php4, .php5, .phtml) through C...
Feb 17, 2020CVE-2020-8955 is a buffer overflow vulnerability in WeeChat's IRC plugin that allows remote attackers to crash the application or potentially execute ...
Feb 12, 2020CVE-2019-19921 is a privilege escalation vulnerability in runc (container runtime) that allows attackers with container creation privileges to escape ...
Feb 12, 2020This vulnerability allows remote attackers to trigger an out-of-bounds heap buffer access in QEMU's iSCSI Block driver, potentially causing denial of ...
Feb 11, 2020This vulnerability is a JavaScript implementation flaw in Google Chrome that allows remote attackers to potentially exploit heap corruption via crafte...
Feb 11, 2020This vulnerability in Google Chrome's PDFium component allows attackers to exploit heap corruption by tricking users into opening malicious PDF files....
Feb 11, 2020This vulnerability in Google Chrome on macOS allows attackers to execute arbitrary code by convincing users to install a malicious extension. It affec...
Feb 11, 2020This vulnerability in Google Chrome's Blink rendering engine allows remote attackers to potentially execute arbitrary code or cause denial of service ...
Feb 11, 2020CVE-2020-6406 is a use-after-free vulnerability in Chrome's audio component that allows remote attackers to potentially exploit heap corruption via cr...
Feb 11, 2020This is a type confusion vulnerability in Chrome's JavaScript engine that could allow an attacker to corrupt heap memory. Attackers can exploit this b...
Feb 11, 2020HtmlUnit versions before 2.37.0 contain improper Rhino JavaScript engine initialization that allows malicious JavaScript to execute arbitrary Java cod...
Feb 11, 2020CVE-2020-8840 is a deserialization vulnerability in FasterXML jackson-databind that allows remote code execution via JNDI injection. Attackers can exp...
Feb 10, 2020CVE-2019-15604 is an improper certificate validation vulnerability in Node.js that causes the process to crash when processing a specially crafted X.5...
Feb 7, 2020CVE-2019-15605 is an HTTP request smuggling vulnerability in Node.js that allows attackers to bypass security controls and deliver malicious payloads ...
Feb 7, 2020CVE-2016-9928 is a roster push vulnerability in MCabber XMPP client that allows attackers to manipulate contact rosters. Remote attackers can add them...
Feb 6, 2020CVE-2020-5208 is a buffer overflow vulnerability in ipmitool that allows remote attackers to execute arbitrary code on systems running vulnerable vers...
Feb 5, 2020CVE-2020-8450 is a buffer overflow vulnerability in Squid proxy servers configured as reverse proxies. Remote attackers can exploit incorrect buffer m...
Feb 4, 2020CVE-2020-8597 is a critical buffer overflow vulnerability in pppd (Point-to-Point Protocol daemon) that allows remote attackers to execute arbitrary c...
Feb 3, 2020This vulnerability in Netty's HTTP decoder allows HTTP request smuggling by accepting conflicting Content-Length and Transfer-Encoding headers. Attack...
Jan 29, 2020This CVE describes a stack-based buffer overflow vulnerability in Sudo when the pwfeedback option is enabled. Attackers can exploit this by providing ...
Jan 29, 2020CVE-2020-7247 is a critical remote code execution vulnerability in OpenSMTPD that allows unauthenticated remote attackers to execute arbitrary command...
Jan 29, 2020CVE-2015-8011 is a buffer overflow vulnerability in lldpd's lldp_decode function that allows remote attackers to crash the LLDP daemon and potentially...
Jan 28, 2020This vulnerability is a heap-based buffer overflow in OpenJPEG's JPEG 2000 image processing library. It allows attackers to execute arbitrary code or ...
Jan 28, 2020This vulnerability allows remote attackers to gain administrative privileges on Prosody XMPP servers using mod_auth_ldap or mod_auth_ldap2 modules. At...
Jan 28, 2020This vulnerability in PostgreSQL's to_char function allows remote authenticated users to trigger buffer over-reads or buffer overflows via specially c...
Jan 27, 2020This vulnerability in PostgreSQL's pgcrypto extension allows remote authenticated users to trigger buffer overflows, potentially causing denial of ser...
Jan 27, 2020This vulnerability in PostgreSQL allows remote attackers to perform SQL injection attacks by sending crafted binary data that triggers protocol synchr...
Jan 27, 2020This CVE describes a URL parameter injection vulnerability in multiple CAS client implementations that allows remote attackers to inject arbitrary web...
Jan 24, 2020CVE-2019-17570 is an untrusted deserialization vulnerability in Apache XML-RPC library that allows remote code execution. A malicious XML-RPC server c...
Jan 23, 2020CVE-2019-16792 is an HTTP request smuggling vulnerability in Waitress web server that allows attackers to bypass security controls by sending duplicat...
Jan 22, 2020This vulnerability in libxml2 2.9.10 causes a memory leak in the xmlSchemaValidateStream function when processing XML schemas. It affects any applicat...
Jan 21, 2020CVE-2020-7595 is an infinite loop vulnerability in libxml2's XML parser that occurs during specific end-of-file conditions. When exploited, it causes ...
Jan 21, 2020CVE-2020-7040 is a symlink attack vulnerability in storeBackup.pl that allows local users to create or manipulate the /tmp/storeBackup.lock file. This...
Jan 21, 2020This vulnerability allows unauthenticated attackers with network access to the SaltStack Salt API endpoint to execute arbitrary commands on the salt-a...
Jan 17, 2020This vulnerability in hiredis library versions through 0.14.0 allows denial of service attacks due to NULL pointer dereference when malloc fails to al...
Jan 16, 2020This vulnerability in ClamAV allows remote attackers to cause denial of service by sending specially crafted email files that trigger inefficient MIME...
Jan 15, 2020This CVE describes a Java serialization vulnerability that allows remote code execution. Attackers can exploit it via network protocols to compromise ...
Jan 15, 2020This vulnerability in PowerDNS Authoritative Server allows remote attackers to crash the DNS service by sending specially crafted DNS query packets. I...
Jan 15, 2020This vulnerability in SchedMD Slurm allows local users to execute the 'srun --uid' command with incorrect privileges, potentially enabling privilege e...
Jan 13, 2020This vulnerability in OpenJPEG allows attackers to execute arbitrary code or cause denial of service via a heap-based buffer overflow when processing ...
Jan 13, 2020This SQL injection vulnerability in phpMyAdmin allows authenticated attackers to inject malicious SQL queries through the username field on the user a...
Jan 9, 2020A type confusion vulnerability in Firefox and Firefox ESR could allow attackers to execute arbitrary code by exploiting missing case handling for obje...
Jan 8, 2020This CVE describes memory safety bugs in Firefox and Firefox ESR that could lead to memory corruption. With sufficient effort, attackers could potenti...
Jan 8, 2020This vulnerability allows an attacker to bypass TCP-based intrusion detection signatures in Suricata by sending specially crafted TCP packets with inv...
Jan 6, 2020This vulnerability allows attackers to bypass TCP-based intrusion detection signatures in Suricata by injecting fake FIN packets that overlap legitima...
Jan 6, 2020CVE-2019-19911 is a denial-of-service vulnerability in Pillow's FpxImagePlugin that occurs when processing specially crafted FPX images. The vulnerabi...
Jan 5, 2020CVE-2019-20330 is a deserialization vulnerability in FasterXML jackson-databind that allows remote code execution through malicious JSON payloads. It ...
Jan 3, 2020CVE-2020-5311 is a buffer overflow vulnerability in Pillow's SGI image decoding component. Attackers can exploit this by tricking users or systems int...
Jan 3, 2020This vulnerability is a buffer overflow in the FLI image decoder component of Pillow (Python Imaging Library). Attackers can exploit this by crafting ...
Jan 3, 2020An off-by-one error in OpenLDAP's dnssrv backend allows attackers to crash the slapd service by sending crafted DNS SRV responses. This affects OpenLD...
Jan 2, 2020Why Monitor Debian Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,917+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.
Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Debian CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions