Debian Security Vulnerabilities (CVEs)
Track 1,963 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
CVE-2019-14493 is a NULL pointer dereference vulnerability in OpenCV's XML parser that can cause denial of service (crash) when processing malicious X...
Aug 1, 2019CVE-2019-0193 is a remote code execution vulnerability in Apache Solr's DataImportHandler module. Attackers can exploit the debug mode's 'dataConfig' ...
Aug 1, 2019CVE-2019-14462 is an out-of-bounds read vulnerability in libmodbus that allows attackers to read sensitive memory contents when processing MODBUS_FC_W...
Jul 31, 2019CVE-2019-14379 is a remote code execution vulnerability in FasterXML jackson-databind that occurs when default typing is enabled and ehcache is used. ...
Jul 29, 2019CVE-2019-13917 is a critical remote code execution vulnerability in Exim mail servers that allows attackers to execute arbitrary commands as root in c...
Jul 25, 2019CVE-2019-1010174 is a command injection vulnerability in CImg Library that allows remote code execution. Attackers can execute arbitrary commands by p...
Jul 25, 2019A heap buffer overflow vulnerability in Pango's text layout engine allows remote code execution when applications process specially crafted UTF-8 stri...
Jul 19, 2019CVE-2019-13962 is a heap-based buffer over-read vulnerability in VLC media player's video decoding component. Attackers can exploit this by tricking u...
Jul 18, 2019This vulnerability in LibreOffice allows malicious documents to execute arbitrary Python commands silently without user warning. Attackers can embed s...
Jul 17, 2019This CVE describes a SQL injection vulnerability in SchedMD Slurm workload manager. Attackers can execute arbitrary SQL commands on Slurm databases, p...
Jul 11, 2019A remote buffer overflow vulnerability in ZeroMQ's libzmq library allows unauthenticated attackers to execute arbitrary code on servers using CURVE en...
Jul 10, 2019This vulnerability allows attackers to bypass re-authentication when changing email addresses in MediaWiki, potentially leading to account takeover. I...
Jul 10, 2019CVE-2019-7165 is a critical buffer overflow vulnerability in DOSBox 0.74-2 that allows attackers to execute arbitrary code on affected systems. This a...
Jul 3, 2019CVE-2019-12594 is an incorrect access control vulnerability in DOSBox 0.74-2 that allows local users to escalate privileges or execute arbitrary code....
Jul 2, 2019This vulnerability in ImageMagick's CUT image decoder allows attackers to trigger a use of uninitialized value, potentially leading to memory corrupti...
Jul 1, 2019This vulnerability in PHP's iconv_mime_decode_headers() function allows attackers to trigger an integer overflow leading to out-of-bounds memory reads...
Jun 19, 2019This CVE describes a heap-based buffer overflow vulnerability in the Linux kernel's mwifiex wireless driver. Attackers could exploit this to corrupt m...
Jun 14, 2019This CVE is a security regression of CVE-2019-9636 in Python's URL parsing that allows attackers to craft malicious URLs to trick applications into se...
Jun 7, 2019CVE-2019-10149 is a critical remote command execution vulnerability in Exim mail transfer agent versions 4.87 through 4.91. Attackers can exploit impr...
Jun 5, 2019This vulnerability in GNOME GLib's file copy function allows attackers to create files with insecure default permissions (typically world-readable/wri...
May 29, 2019CVE-2019-12046 is an incorrect access control vulnerability in LemonLDAP::NG 2.0.3 that allows attackers to bypass authentication and authorization me...
May 22, 2019This vulnerability in PharStreamWrapper allows attackers to bypass directory traversal protections in TYPO3's phar:// stream wrapper. By using special...
May 9, 2019This vulnerability is a buffer over-read in dhcpcd's DHCPv6 Prefix Delegation Exclude feature that could allow attackers to read sensitive memory cont...
May 5, 2019This vulnerability in PHP's EXIF extension allows attackers to cause a buffer over-read when processing certain image files. This can lead to informat...
May 3, 2019CVE-2019-11627 is a shell injection vulnerability in gpg-key2ps utility of signing-party package. Attackers can execute arbitrary commands by crafting...
Apr 30, 2019This vulnerability in PHP's EXIF extension allows attackers to cause buffer over-reads when processing certain image files. This can lead to informati...
Apr 18, 2019This vulnerability in libxslt allows attackers to bypass URL access controls by crafting malicious URLs that cause xsltCheckRead to return -1 error co...
Apr 10, 2019This CVE allows remote attackers to guess the automatically generated development mode secret token in vulnerable Rails versions, which can be combine...
Mar 27, 2019This vulnerability in Python 2.x's urllib library allows attackers to bypass file URI blacklists using the 'local_file:' scheme, enabling unauthorized...
Mar 23, 2019PuTTY versions before 0.71 have a cryptographic vulnerability where random numbers used for SSH session keys could be recycled, potentially allowing a...
Mar 21, 2019This vulnerability in libssh2 allows a compromised SSH server to trigger an out-of-bounds read in client software, potentially causing denial of servi...
Mar 21, 2019CVE-2018-20177 is a critical integer overflow vulnerability in rdesktop RDP client that leads to heap-based buffer overflow and remote code execution....
Mar 15, 2019CVE-2018-20181 is a critical integer underflow vulnerability in rdesktop RDP client that leads to heap-based buffer overflow and remote code execution...
Mar 15, 2019This vulnerability in PHP's EXIF component allows attackers to read uninitialized memory from TIFF image files, potentially leading to information dis...
Mar 9, 2019This vulnerability in Python's urllib.parse module allows attackers to craft URLs that appear to belong to one domain but are parsed as another due to...
Mar 8, 2019CVE-2019-9631 is a heap-based buffer over-read vulnerability in Poppler's PDF rendering library. Attackers can exploit this by crafting malicious PDF ...
Mar 8, 2019CVE-2018-12405 is a critical memory corruption vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that could allow remote attackers to exe...
Feb 28, 2019A buffer overflow vulnerability in the Skia graphics library allows attackers to cause memory corruption through specially crafted 2D canvas operation...
Feb 28, 2019This vulnerability is an integer overflow in image buffer size calculations in Mozilla products, which can lead to out-of-bounds writes. Attackers cou...
Feb 28, 2019This is a critical memory corruption vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that could allow attackers to execute arbitrary co...
Feb 28, 2019This vulnerability allows attackers to trigger a potentially exploitable crash in Firefox, Firefox ESR, and Thunderbird by manipulating user events in...
Feb 28, 2019CVE-2019-9215 is a critical memory corruption vulnerability in Live555 media streaming server where malformed authorization headers cause invalid memo...
Feb 28, 2019This vulnerability in PHP's xmlrpc_decode() function allows attackers to trigger invalid memory access (heap out-of-bounds read or read-after-free) by...
Feb 22, 2019This CVE describes heap-based buffer over-read vulnerabilities in PHP's mbstring regular expression functions when processing invalid multibyte data. ...
Feb 22, 2019CVE-2019-7164 is a SQL injection vulnerability in SQLAlchemy that allows attackers to inject malicious SQL code via the order_by parameter. This affec...
Feb 20, 2019This vulnerability in Google Chrome allowed attackers to escape the browser's security sandbox via specially crafted HTML pages. It affected Chrome on...
Feb 19, 2019This vulnerability allows local code injection in Debian's python-rdflib-tools package. Attackers can execute arbitrary Python code by placing malicio...
Feb 9, 2019This CVE describes memory safety bugs in Mozilla Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could...
Feb 5, 2019CVE-2018-8793 is a critical heap-based buffer overflow vulnerability in rdesktop RDP client that allows remote attackers to execute arbitrary code on ...
Feb 5, 2019CVE-2018-8795 is a critical integer overflow vulnerability in rdesktop RDP client that leads to heap-based buffer overflow and remote code execution. ...
Feb 5, 2019Why Monitor Debian Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 1,963+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.
Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Debian CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions