debian security advisories
4 threat alerts tracking vulnerabilities and security advisories that affect debian products.
Vulnios monitors debian CVE feeds, vendor advisories, CISA KEV listings, and exploit-prediction data continuously. Each alert below is enriched with severity, exploitation status, affected products, and a remediation path. Use this page to scan recent debian security news in one place, or click into an individual alert for full detail.
Critical Vulnerability: CVE-2016-1253 — debian — most, debian_linux
The most package in Debian wheezy before 5.0.0a-2.2, in Debian jessie before 5.0.0a-2.3+deb8u1, and in Debian unstable before 5.0.0a-3 allows remote attackers to execute arbitrary commands via shell m
criticalCVE-2016-1253Critical Vulnerability: CVE-2017-8805 — debian — ftpsync
Debian ftpsync before 20171017 does not use the rsync --safe-links option, which allows remote attackers to conduct directory traversal attacks via a crafted upstream mirror.
criticalCVE-2017-8805Critical Vulnerability: CVE-2014-9513 — debian — xbindkeys-config
Insecure use of temporary files in xbindkeys-config 0.1.3-2 allows remote attackers to execute arbitrary code.
criticalCVE-2014-9513Critical Vulnerability: CVE-2017-8283 — debian — dpkg
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct direc
criticalCVE-2017-8283
Track debian exposure across your environment
Vulnios automatically cross-references your asset inventory against new debian CVEs and surfaces only what affects you. No more sifting manually — actionable findings only.
Start a free scan