Debian Security Vulnerabilities (CVEs)

Track 1,877 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

322 Critical
1,255 High
300 Medium
🔔 Get Alerts for Debian
CVE-2020-26154 9.8

CVE-2020-26154 is a critical buffer overflow vulnerability in libproxy's url.cpp component when PAC (Proxy Auto-Configuration) is enabled. Attackers c...

Sep 30, 2020
CVE-2020-26117 8.1

This vulnerability in TigerVNC allows attackers to impersonate any VNC server after a client accepts a TLS certificate exception. When users bypass ce...

Sep 27, 2020
CVE-2020-25599 7.0

A race condition vulnerability in Xen's event channel reset mechanism allows x86 PV guests to potentially escalate privileges to host level, cause hos...

Sep 23, 2020
CVE-2020-25603 7.8

A memory barrier vulnerability in Xen hypervisor event channel handling allows malicious guests to potentially cause hypervisor crashes (DoS) or leak ...

Sep 23, 2020
CVE-2020-25595 7.8

This vulnerability in Xen's PCI passthrough code allows guests with passed-through PCI devices to crash the hypervisor, causing a system-wide denial o...

Sep 23, 2020
CVE-2020-6573 9.6

This is a use-after-free vulnerability in Google Chrome's video component on Android that allows a remote attacker who has already compromised the ren...

Sep 21, 2020
CVE-2020-6575 8.3

This vulnerability is a race condition in Chrome's Mojo IPC system that allows an attacker who has already compromised the renderer process to potenti...

Sep 21, 2020
CVE-2020-6550 8.8

This is a use-after-free vulnerability in Chrome's IndexedDB implementation that allows remote attackers to potentially exploit heap corruption. Attac...

Sep 21, 2020
CVE-2020-6552 8.8

This is a use-after-free vulnerability in Chrome's Blink rendering engine that allows remote attackers to potentially exploit heap corruption. Attacke...

Sep 21, 2020
CVE-2020-6554 8.6

This is a use-after-free vulnerability in Chrome's extension system that allows a remote attacker to escape Chrome's sandbox via a malicious extension...

Sep 21, 2020
CVE-2020-6556 8.8

CVE-2020-6556 is a heap buffer overflow vulnerability in SwiftShader, Chrome's software renderer, that allows remote attackers to potentially execute ...

Sep 21, 2020
CVE-2020-6559 8.8

This is a use-after-free vulnerability in Google Chrome's Presentation API that allows remote attackers to potentially exploit heap corruption via a c...

Sep 21, 2020
CVE-2020-15965 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that allows attackers to potentially access memory outside intended bound...

Sep 21, 2020
CVE-2020-6532 8.8

This vulnerability is a use-after-free memory corruption flaw in Chrome's SCTP implementation that allows remote attackers to potentially execute arbi...

Sep 21, 2020
CVE-2020-6539 8.8

This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to potentially exploit heap corruption via a crafted HTML p...

Sep 21, 2020
CVE-2020-6541 8.8

This vulnerability allows a remote attacker to execute arbitrary code or cause heap corruption via a use-after-free bug in Chrome's WebUSB implementat...

Sep 21, 2020
CVE-2020-6543 8.8

This is a use-after-free vulnerability in Google Chrome's task scheduling component that allows remote attackers to potentially exploit heap corruptio...

Sep 21, 2020
CVE-2020-6545 8.8

This is a use-after-free vulnerability in Chrome's audio component that allows remote attackers to potentially exploit heap corruption via a crafted H...

Sep 21, 2020
CVE-2020-6548 8.8

This vulnerability is a heap buffer overflow in the Skia graphics library used by Google Chrome. It allows a remote attacker who has already compromis...

Sep 21, 2020
CVE-2020-15960 8.8

This vulnerability is a heap buffer overflow in Google Chrome's storage component that allows remote attackers to potentially perform out-of-bounds me...

Sep 21, 2020
CVE-2020-15961 9.6

This vulnerability in Google Chrome allowed malicious extensions to bypass security sandbox restrictions. Attackers could convince users to install a ...

Sep 21, 2020
CVE-2020-15963 9.6

This vulnerability in Google Chrome allows attackers who convince users to install malicious extensions to potentially escape the browser's security s...

Sep 21, 2020
CVE-2020-24660 9.8

This vulnerability allows attackers to bypass URL-based access controls in LemonLDAP::NG when used with NGINX by submitting non-normalized URIs. It af...

Sep 14, 2020
CVE-2020-15166 7.5

CVE-2020-15166 is a denial-of-service vulnerability in ZeroMQ where attackers can disrupt message delivery to legitimate clients by connecting raw TCP...

Sep 11, 2020
CVE-2020-6097 7.5

This vulnerability allows remote attackers to cause denial of service in atftpd servers by sending specially crafted RRQ-Multicast requests that trigg...

Sep 10, 2020
CVE-2020-24379 9.8

This vulnerability allows attackers to perform XML External Entity (XXE) injection attacks through the WebDAV implementation in Yaws web server. Attac...

Sep 9, 2020
CVE-2020-25212 7.0

This CVE describes a Time-of-Check Time-of-Use (TOCTOU) vulnerability in the Linux kernel's NFS client code that allows local attackers to corrupt ker...

Sep 9, 2020
CVE-2019-20916 7.5

This vulnerability in pip allows directory traversal attacks when installing packages from URLs. Attackers can overwrite arbitrary files on the system...

Sep 4, 2020
CVE-2020-7729 7.1

CVE-2020-7729 allows arbitrary code execution in Grunt task runner when processing malicious YAML files. The vulnerability exists because Grunt uses t...

Sep 3, 2020
CVE-2020-24616 8.1

This is a deserialization vulnerability in FasterXML jackson-databind that allows remote code execution when processing untrusted JSON data. It affect...

Aug 25, 2020
CVE-2020-24606 8.6

This vulnerability allows a trusted peer in a Squid proxy cache hierarchy to cause a denial of service by sending a specially crafted Cache Digest res...

Aug 24, 2020
CVE-2020-14350 7.3

This CVE describes a PostgreSQL vulnerability where certain extensions don't properly secure their installation scripts against search_path manipulati...

Aug 24, 2020
CVE-2020-8623 7.5

CVE-2020-8623 is a denial-of-service vulnerability in BIND DNS servers where specially crafted queries can cause the server to crash. Affected systems...

Aug 21, 2020
CVE-2020-24368 7.5

CVE-2020-24368 is a directory traversal vulnerability in Icinga Web2 that allows attackers to read arbitrary files accessible by the Icinga Web2 proce...

Aug 19, 2020
CVE-2020-13933 7.5

CVE-2020-13933 is an authentication bypass vulnerability in Apache Shiro where specially crafted HTTP requests can circumvent authentication mechanism...

Aug 17, 2020
CVE-2020-1472 5.5

CVE-2020-1472 (Zerologon) is a critical authentication bypass vulnerability in Microsoft's Netlogon protocol that allows unauthenticated attackers to ...

Aug 17, 2020
CVE-2020-24361 9.8

CVE-2020-24361 is a critical remote code execution vulnerability in SNMPTT (SNMP Trap Translator) that allows attackers to execute arbitrary shell com...

Aug 16, 2020
CVE-2020-16303 7.8

A use-after-free vulnerability in GhostScript's XPS image processing allows remote attackers to execute arbitrary code via a malicious PDF file. This ...

Aug 13, 2020
CVE-2020-12100 7.5

This vulnerability in Dovecot email server allows remote attackers to cause denial of service by sending specially crafted emails with deeply nested M...

Aug 12, 2020
CVE-2020-12674 7.5

CVE-2020-12674 is a buffer overflow vulnerability in Dovecot's authentication service where a specially crafted RPA request with zero length causes a ...

Aug 12, 2020
CVE-2020-17446 9.8

CVE-2020-17446 is a critical vulnerability in asyncpg versions before 0.21.0 where a malicious PostgreSQL server can send crafted responses that trigg...

Aug 12, 2020
CVE-2020-17367 7.8

CVE-2020-17367 is a command injection vulnerability in Firejail, a Linux sandboxing tool, where the -- end-of-options indicator is not properly honore...

Aug 11, 2020
CVE-2020-17368 9.8

CVE-2020-17368 is a command injection vulnerability in Firejail up to version 0.9.62 that allows attackers to execute arbitrary commands on the host s...

Aug 11, 2020
CVE-2020-9490 7.5

This vulnerability in Apache HTTP Server allows an attacker to cause a denial-of-service (crash) by sending a specially crafted Cache-Digest header in...

Aug 7, 2020
CVE-2020-11984 9.8

CVE-2020-11984 is a critical vulnerability in Apache HTTP Server's mod_proxy_uwsgi module that allows attackers to disclose sensitive information and ...

Aug 7, 2020
CVE-2020-11993 7.5

This vulnerability in Apache HTTP Server's HTTP/2 module allows concurrent memory pool misuse when trace/debug logging is enabled under specific traff...

Aug 7, 2020
CVE-2020-16845 7.5

This vulnerability in Go's encoding/binary package allows attackers to cause infinite read loops via specially crafted invalid inputs to ReadUvarint a...

Aug 6, 2020
CVE-2020-17353 9.8

This vulnerability in LilyPond allows arbitrary code execution when processing malicious music scores with embedded PostScript or SVG content, even wh...

Aug 5, 2020
CVE-2020-10713 8.2

CVE-2020-10713 is a buffer overflow vulnerability in GRUB2 bootloader versions before 2.06 that allows attackers with physical or administrative acces...

Jul 30, 2020
CVE-2020-12460 9.8

CVE-2020-12460 is a critical heap overflow vulnerability in OpenDMARC that allows remote attackers to cause memory corruption by sending specially cra...

Jul 27, 2020

Why Monitor Debian Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,877+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.

Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Debian CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Debian CVEs Free