Debian Security Vulnerabilities (CVEs)

Track 1,877 security vulnerabilities affecting Debian products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

322 Critical
1,255 High
300 Medium
🔔 Get Alerts for Debian
CVE-2020-6524 8.8

This vulnerability allows a remote attacker to trigger a heap buffer overflow in Chrome's WebAudio component by tricking users into visiting a malicio...

Jul 22, 2020
CVE-2020-6530 8.8

This vulnerability allows an attacker to exploit heap corruption through out-of-bounds memory access in Chrome's developer tools. Attackers can execut...

Jul 22, 2020
CVE-2020-6533 8.8

This is a type confusion vulnerability in Chrome's V8 JavaScript engine that could allow a remote attacker to execute arbitrary code or cause heap cor...

Jul 22, 2020
CVE-2020-6512 8.8

This vulnerability is a type confusion flaw in Chrome's V8 JavaScript engine that allows a remote attacker to potentially exploit heap corruption via ...

Jul 22, 2020
CVE-2020-6515 8.8

CVE-2020-6515 is a use-after-free vulnerability in Google Chrome's tab strip component that allows remote attackers to potentially exploit heap corrup...

Jul 22, 2020
CVE-2020-6517 8.8

CVE-2020-6517 is a heap buffer overflow vulnerability in Google Chrome's history component that allows remote attackers to potentially execute arbitra...

Jul 22, 2020
CVE-2020-6520 8.8

This vulnerability is a buffer overflow in Skia, Chrome's graphics engine, that allows remote attackers to potentially exploit heap corruption via a c...

Jul 22, 2020
CVE-2020-6522 9.6

This vulnerability in Google Chrome allowed attackers to escape the browser's security sandbox via malicious HTML pages that exploited flaws in extern...

Jul 22, 2020
CVE-2020-15866 9.8

CVE-2020-15866 is a critical heap-based buffer overflow vulnerability in mruby's virtual machine stack handling. Attackers can exploit this to execute...

Jul 21, 2020
CVE-2020-14001 9.8

The kramdown gem before version 2.3.0 for Ruby processes template options inside Kramdown documents by default, allowing attackers to read arbitrary f...

Jul 17, 2020
CVE-2020-14593 7.4

This vulnerability in Oracle Java SE's 2D component allows unauthenticated attackers to modify critical data in Java deployments that run untrusted co...

Jul 15, 2020
CVE-2019-17637 7.1

This vulnerability in Eclipse Web Tools Platform allows XML External Entity (XXE) attacks even when external entity resolution is disabled in user pre...

Jul 15, 2020
CVE-2020-13935 7.5

This vulnerability in Apache Tomcat allows attackers to cause denial of service by sending WebSocket frames with invalid payload lengths, which trigge...

Jul 14, 2020
CVE-2019-20907 7.5

This vulnerability allows an attacker to craft a malicious TAR archive that causes an infinite loop when processed by Python's tarfile module. This le...

Jul 13, 2020
CVE-2020-10745 7.5

This vulnerability allows remote attackers to cause denial of service through excessive CPU consumption by exploiting a flaw in Samba's NetBIOS over T...

Jul 7, 2020
CVE-2020-15565 8.8

This vulnerability in Xen hypervisor allows x86 Intel HVM guest OS users to potentially cause host OS denial of service or gain privileges due to insu...

Jul 7, 2020
CVE-2020-15567 7.8

A race condition vulnerability in Xen hypervisor allows Intel guest OS users to gain privileges or cause denial of service through non-atomic modifica...

Jul 7, 2020
CVE-2020-14303 7.5

This vulnerability allows any user to crash Samba's AD DC NBT server by sending an empty UDP packet, causing denial of service. It affects all Samba v...

Jul 6, 2020
CVE-2020-15466 7.5

This CVE describes an infinite loop vulnerability in Wireshark's GVCP dissector that can cause denial of service. When processing malicious network pa...

Jul 5, 2020
CVE-2020-8163 8.8

This is a remote code execution vulnerability in Ruby on Rails that allows attackers to execute arbitrary code on vulnerable systems. It affects appli...

Jul 2, 2020
CVE-2020-15503 7.5

CVE-2020-15503 is an integer overflow vulnerability in LibRaw's thumbnail processing code that allows attackers to cause heap-based buffer overflows b...

Jul 2, 2020
CVE-2020-4067 7.0

CVE-2020-4067 is an information disclosure vulnerability in coturn STUN/TURN servers where uninitialized memory buffers allow attackers to leak data f...

Jun 29, 2020
CVE-2020-11996 7.5

This CVE describes a denial-of-service vulnerability in Apache Tomcat's HTTP/2 implementation where specially crafted requests can cause high CPU usag...

Jun 26, 2020
CVE-2020-9494 7.5

This vulnerability in Apache Traffic Server allows attackers to send specially crafted HTTP/2 HEADERS frames that cause excessive memory allocation an...

Jun 24, 2020
CVE-2020-12865 8.0

CVE-2020-12865 is a heap buffer overflow vulnerability in SANE Backends that allows arbitrary code execution. Attackers on the same local network as v...

Jun 24, 2020
CVE-2020-14929 7.5

This CVE affects Alpine email client versions before 2.23, where sending a /tls command during PREAUTH causes the client to silently fall back to inse...

Jun 19, 2020
CVE-2020-8165 9.8

This vulnerability allows remote code execution in Ruby on Rails applications using MemCacheStore or RedisCacheStore for caching. Attackers can exploi...

Jun 19, 2020
CVE-2020-8162 7.5

This vulnerability in Ruby on Rails ActiveStorage's S3 adapter allows attackers to modify the Content-Length header during direct file uploads, bypass...

Jun 19, 2020
CVE-2020-8184 7.5

This vulnerability in Rack (Ruby web server interface) allows attackers to forge secure or host-only cookie prefixes due to insufficient validation. T...

Jun 19, 2020
CVE-2018-21247 7.5

CVE-2018-21247 is an information leak vulnerability in LibVNCServer where the ConnectToRFBRepeater function exposes uninitialized memory contents. Thi...

Jun 17, 2020
CVE-2019-20840 7.5

CVE-2019-20840 is a memory corruption vulnerability in LibVNCServer's WebSocket decoding functionality that can cause crashes due to unaligned memory ...

Jun 17, 2020
CVE-2020-14397 7.5

CVE-2020-14397 is a NULL pointer dereference vulnerability in LibVNCServer's rfbregion.c that can cause denial of service (crash) when processing mali...

Jun 17, 2020
CVE-2020-14399 7.5

CVE-2020-14399 is a memory access vulnerability in LibVNCServer where byte-aligned data is accessed through uint32_t pointers, potentially causing mem...

Jun 17, 2020
CVE-2020-14195 8.1

This vulnerability in FasterXML jackson-databind allows remote code execution through deserialization of untrusted data. Attackers can exploit the int...

Jun 16, 2020
CVE-2020-14147 7.7

This CVE describes an integer overflow vulnerability in Redis's Lua sandbox that allows authenticated users with Lua execution permissions to trigger ...

Jun 15, 2020
CVE-2020-14152 7.1

This vulnerability in IJG JPEG (libjpeg) allows excessive memory consumption when processing JPEG images. The jpeg_mem_available() function fails to r...

Jun 15, 2020
CVE-2020-14062 8.1

This vulnerability in FasterXML jackson-databind allows remote code execution through deserialization of untrusted data. Attackers can exploit the int...

Jun 14, 2020
CVE-2020-0198 7.5

This CVE describes an integer overflow vulnerability in Android's EXIF data parsing library that can cause undefined behavior sanitizer (UBSAN) to abo...

Jun 11, 2020
CVE-2020-10757 7.8

This vulnerability in the Linux kernel allows local attackers with access to DAX-enabled storage to escalate privileges on the system. It affects Linu...

Jun 9, 2020
CVE-2020-13974 7.8

This CVE describes an integer overflow vulnerability in the Linux kernel's keyboard driver (drivers/tty/vt/keyboard.c) that could potentially lead to ...

Jun 9, 2020
CVE-2020-13428 7.8

A heap-based buffer overflow vulnerability in VLC media player's H.264 video processing allows remote attackers to crash the application or execute ar...

Jun 8, 2020
CVE-2020-12695 7.5

CallStranger is a UPnP vulnerability that allows attackers to abuse subscription requests to perform SSRF attacks, port scanning, and DDoS amplificati...

Jun 8, 2020
CVE-2020-13871 7.5

CVE-2020-13871 is a use-after-free vulnerability in SQLite's window function implementation that could allow memory corruption. This affects applicati...

Jun 6, 2020
CVE-2020-13848 7.5

CVE-2020-13848 is a NULL pointer dereference vulnerability in Portable UPnP SDK (libupnp) that allows remote attackers to cause denial of service (cra...

Jun 4, 2020
CVE-2020-13777 7.4

This GnuTLS vulnerability uses incorrect cryptography for session ticket encryption, causing loss of confidentiality in TLS 1.2 and authentication byp...

Jun 4, 2020
CVE-2020-6493 9.6

This is a use-after-free vulnerability in Chrome's WebAuthentication API that allows a remote attacker who has already compromised the renderer proces...

Jun 3, 2020
CVE-2020-6496 8.8

This is a use-after-free vulnerability in Google Chrome's payments component on macOS that allows a remote attacker to potentially escape Chrome's san...

Jun 3, 2020
CVE-2020-11039 8.0

This vulnerability in FreeRDP allows a malicious server to read and write arbitrary memory when USB redirection is enabled, due to integer overflows i...

May 29, 2020
CVE-2020-13630 7.0

CVE-2020-13630 is a use-after-free vulnerability in SQLite's FTS3 extension that can lead to memory corruption and potential code execution. It affect...

May 27, 2020
CVE-2020-6831 9.8

A buffer overflow vulnerability in WebRTC's SCTP chunk parsing allows memory corruption and potentially exploitable crashes. This affects Firefox ESR ...

May 26, 2020

Why Monitor Debian Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,877+ known vulnerabilities affecting Debian products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Debian packages in under 60 seconds. No agents required - completely agentless scanning that works across Debian deployments.

Free vulnerability database: Access detailed information about every Debian CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Debian CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Debian CVEs Free