Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [ nc-nextcloud ]
- Downloading Nextcloud 13.0.5...
- Installing Nextcloud 13.0.5...
- Creating possible missing Directories
- chmod Files and Directories
- chown Directories
- chmod/chown .htaccess
- Setting up database...
- Setting up Apache...
- Enabling site nextcloud.
- To activate the new configuration, you need to run:
- systemctl reload apache2
- Setting up system...
- Don't forget to run nc-init
- [ nc-httpsonly ]
- Forcing HTTPS On
- [ nc-notify-updates ]
- update web notifications enabled
- [ unattended-upgrades ]
- Unattended upgrades active: yes (autoreboot yes)
- [ nc-init ]
- Setting up a clean Nextcloud instance... wait until message 'NC init done'
- Setting up database...
- Setting up Nextcloud...
- Nextcloud is not installed - only a limited number of commands are available
- Nextcloud was successfully installed
- Set mode for background jobs to 'cron'
- System config value mysql.utf8mb4 set to boolean true
- System config value trusted_domains => 1 set to string 192.168.0.199
- System config value trusted_domains => 5 set to string nextcloudpi.local
- System config value mail_smtpmode set to string php
- System config value mail_smtpauthtype set to string LOGIN
- System config value mail_from_address set to string admin
- System config value mail_domain set to string ownyourbits.com
- calendar installed
- contacts installed
- notes installed
- tasks installed
- news installed
- admin_notifications installed
- calendar enabled
- contacts enabled
- notes enabled
- tasks enabled
- news enabled
- admin_notifications enabled
- System config value overwriteprotocol set to string https
- NC init done
- [ fail2ban ]
- System config value loglevel set to string 2
- System config value log_type set to string file
- fail2ban enabled
- [ spDYN ]
- [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
- [ nc-admin ]
- Successfully reset password for ncp
- [ nc-passwd ]
- password updated successfully
- Enabling site ncp.
- Enabling site nextcloud.
- To activate the new configuration, you need to run:
- systemctl reload apache2
- Site ncp-activation disabled.
- To activate the new configuration, you need to run:
- systemctl reload apache2
- [ nc-automount ]
- Created symlink /etc/systemd/system/multi-user.target.wants/nc-automount.service → /usr/lib/systemd/system/nc-automount.service.
- Created symlink /etc/systemd/system/multi-user.target.wants/nc-automount-links.service → /usr/lib/systemd/system/nc-automount-links.service.
- automount enabled
- [ nc-format-USB ]
- /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
- Error: Partition(s) 1 on /dev/sda have been written, but we have been unable to inform the kernel of the change, probably because it/they are in use. As a result, the old partition(s) will remain in use. You should reboot now before making further changes.
- [ nc-format-USB ]
- /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
- Error: Partition(s) 1 on /dev/sda have been written, but we have been unable to inform the kernel of the change, probably because it/they are in use. As a result, the old partition(s) will remain in use. You should reboot now before making further changes.
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-automount ]
- automount enabled
- [ nc-format-USB ]
- /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
- /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
- Drive sda formatted successfuly and labeled myCloudDrive
- [ nc-datadir ]
- Maintenance mode enabled
- moving data dir from /var/www/nextcloud/data to /media/USBdrive/ncdata...
- BTRFS filesystem detected
- Create subvolume '/media/USBdrive/ncdata'
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value datadirectory set to string /media/USBdrive/ncdata
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value logfile set to string /media/USBdrive/ncdata/nextcloud.log
- Nextcloud is in maintenance mode - no apps have been loaded
- Maintenance mode disabled
- [ fail2ban ]
- System config value loglevel set to string 2
- System config value log_type set to string file
- fail2ban enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:7678/nservice/
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 402
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:9119/screen_sharing
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:9119/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 402
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:7678/nservice/
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.199) failed with code 402 (Invalid Args)
- GetSpecificPortMappingEntry() failed with code 402 (Invalid Args)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-admin ]
- User does not exist
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-autoupdate-ncp ]
- automatic NextCloudPi updates enabled
- [ nc-backup-auto ]
- automatic backups enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-swapfile ]
- BTRFS doesn't support swapfiles. You can still use nc-zram
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing nc-restore
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- Installing nc-backup
- NextCloudPi updated to version v0.58.1
- [ nc-webui ]
- Site ncp already enabled
- ncp-web enabled
- [ nc-zram ]
- Created symlink /etc/systemd/system/sysinit.target.wants/zram.service → /etc/systemd/system/zram.service.
- ZRAM enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:7678/nservice/
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 402
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:7678/nservice/
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 402
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.227:9119/screen_sharing
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.227:9119/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.199) failed with code 402 (Invalid Args)
- GetSpecificPortMappingEntry() failed with code 402 (Invalid Args)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ spDYN ]
- [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
- [ spDYN ]
- ... removing cronfile: /etc/cron.d/spdnsupdater
- spdnsUpdater is now disabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- You have entered an incorrect username
- -or-
- an incorrect password for this username.
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ dnsmasq ]
- System config value trusted_domains => 2 set to string https://mynextcloudpi.ddns.net/
- System config value overwrite.cli.url set to string https://https://mynextcloudpi.ddns.net/
- dnsmasq enabled
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Obtaining a new certificate
- An unexpected error occurred:
- The request message was malformed :: Error creating new authz :: Invalid character in DNS name
- Please see the logfiles in /var/log/letsencrypt for more details.
- IMPORTANT NOTES:
- - If you lose your account credentials, you can recover through
- e-mails sent to daniel@fam-klauck.de.
- - Your account credentials have been saved in your Certbot
- configuration directory at /etc/letsencrypt. You should make a
- secure backup of this folder now. This configuration directory will
- also contain certificates and private keys obtained by Certbot so
- making regular backups of this folder is ideal.
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Obtaining a new certificate
- Performing the following challenges:
- http-01 challenge for mynextcloudpi.ddns.net
- Using the webroot path /var/www/nextcloud for all unmatched domains.
- Waiting for verification...
- Cleaning up challenges
- Generating key (2048 bits): /etc/letsencrypt/keys/0000_key-certbot.pem
- Creating CSR: /etc/letsencrypt/csr/0000_csr-certbot.pem
- IMPORTANT NOTES:
- - Congratulations! Your certificate and chain have been saved at
- /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
- cert will expire on 2018-10-31. To obtain a new or tweaked version
- of this certificate in the future, simply run certbot again. To
- non-interactively renew *all* of your certificates, run "certbot
- renew"
- - If you like Certbot, please consider supporting our work by:
- Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
- Donating to EFF: https://eff.org/donate-le
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- [ UFW ]
- Firewall is active and enabled on system startup
- Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
- Executing: /lib/systemd/systemd-sysv-install enable ufw
- # web server rules
- Rule added
- Rule added (v6)
- Rule added
- Rule added (v6)
- Rule added
- Rule added (v6)
- # SSH rules
- Rule added
- Rule added (v6)
- # DNS rules
- Rule added
- Rule added (v6)
- # SAMBA rules
- Rule added
- Rule added (v6)
- # NFS rules
- Rule added
- Rule added (v6)
- # UPnP rules
- Rule added
- UFW enabled
- [ nc-audit ]
- General security audit
- [ Lynis 2.4.0 ]
- ################################################################################
- Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
- welcome to redistribute it under the terms of the GNU General Public License.
- See the LICENSE file for details about using this software.
- 2007-2016, CISOfy - https://cisofy.com/lynis/
- Enterprise support available (compliance, plugins, interface and tools)
- ################################################################################
- [+] Initializing program
- ------------------------------------
- [2C- Detecting OS... [41C [ DONE ]
- [2C- Checking profiles...[37C [ DONE ]
- ---------------------------------------------------
- Program version: 2.4.0
- Operating system: Linux
- Operating system name: Debian
- Operating system version: 9.4
- Kernel version: 4.14.50
- Hardware platform: armv7l
- Hostname: nextcloudpi
- ---------------------------------------------------
- Profiles: /etc/lynis/default.prf /etc/lynis/ncp.prf
- Log file: /var/log/lynis.log
- Report file: /var/log/lynis-report.dat
- Report version: 1.0
- Plugin directory: /etc/lynis/plugins
- ---------------------------------------------------
- Auditor: [Not Specified]
- Test category: all
- Test group: all
- ---------------------------------------------------
- [2C- Program update status... [32C [ WARNING ]
- ===============================================================================
- Lynis update available
- ===============================================================================
- Current version is more than 4 months old
- Current version : 240 Latest version : 266
- Please update to the latest version.
- New releases include additional features, bug fixes, tests and baselines.
- Download the latest version:
- Packages (DEB/RPM) - https://packages.cisofy.com
- Website - https://cisofy.com/downloads/
- GitHub - https://github.com/CISOfy/lynis
- ===============================================================================
- [+] System Tools
- ------------------------------------
- [2C- Scanning available tools...[30C
- [2C- Checking system binaries...[30C
- [+] Plugins (phase 1)
- ------------------------------------
- [0CNote: plugins have more extensive tests and may take several minutes to complete[0C
- [0C [0C
- [2C- Plugin: debian[43C
- [
- [+] Debian Tests
- ------------------------------------
- [2C- Checking for system binaries that are required by Debian Tests...[0C
- [4C- Checking /bin... [38C [ FOUND ]
- [4C- Checking /sbin... [37C [ FOUND ]
- [4C- Checking /usr/bin... [34C [ FOUND ]
- [4C- Checking /usr/sbin... [33C [ FOUND ]
- [4C- Checking /usr/local/bin... [28C [ FOUND ]
- [4C- Checking /usr/local/sbin... [27C [ FOUND ]
- [2C- Authentication:[42C
- [4C- PAM (Pluggable Authentication Modules):[16C
- [6C- libpam-tmpdir[40C [ Not Installed ]
- [6C- libpam-usb[43C [ Not Installed ]
- [2C- File System Checks:[38C
- [4C- DM-Crypt, Cryptsetup & Cryptmount:[21C
- [2C- Software:[48C
- [4C- apt-listchanges[40C [ Installed and enabled for apt ]
- [4C- checkrestart[43C [ Installed ]
- [4C- needrestart[44C [ Not Installed ]
- [4C- debsecan[47C [ Installed and enabled for cron ]
- [4C- debsums[48C [ Installed and enabled for cron ]
- [4C- fail2ban[47C [ Installed with jail.local ]
- ]
- [+] Boot and services
- ------------------------------------
- [2C- Service Manager[42C [ systemd ]
- [2C- Checking UEFI boot[39C [ DISABLED ]
- [4C- Boot loader[44C [ NONE FOUND ]
- [2C- Check running services (systemctl)[23C [ DONE ]
- [8CResult: found 31 running services[20C
- [2C- Check enabled services at boot (systemctl)[15C [ DONE ]
- [8CResult: found 47 enabled services[20C
- [2C- Check startup files (permissions)[24C [ OK ]
- [+] Kernel
- ------------------------------------
- [2C- Checking default runlevel[32C [ runlevel 5 ]
- [2C- Checking kernel version and release[22C [ DONE ]
- [2C- Checking kernel type[37C [ DONE ]
- [2C- Checking loaded kernel modules[27C [ DONE ]
- [6CFound 64 active modules[32C
- [2C- Checking Linux kernel configuration file[17C [ NOT FOUND ]
- [2C- Checking core dumps configuration[24C [ DISABLED ]
- [4C- Checking setuid core dumps configuration[15C [ DEFAULT ]
- [2C- Check if reboot is needed[32C [ UNKNOWN ]
- [+] Memory and Processes
- ------------------------------------
- [2C- Checking /proc/meminfo[35C [ FOUND ]
- [2C- Searching for dead/zombie processes[22C [ OK ]
- [2C- Searching for IO waiting processes[23C [ OK ]
- [+] Users, Groups and Authentication
- ------------------------------------
- [2C- Administrator accounts[35C [ OK ]
- [2C- Unique UIDs[46C [ OK ]
- [2C- Consistency of group files (grpck)[23C [ OK ]
- [2C- Unique group IDs[41C [ OK ]
- [2C- Unique group names[39C [ OK ]
- [2C- Password file consistency[32C [ OK ]
- [2C- Query system users (non daemons)[25C [ DONE ]
- [2C- NIS+ authentication support[30C [ NOT ENABLED ]
- [2C- NIS authentication support[31C [ NOT ENABLED ]
- [2C- sudoers file[45C [ FOUND ]
- [4C- Check sudoers file permissions[25C [ OK ]
- [2C- PAM password strength tools[30C [ SUGGESTION ]
- [2C- PAM configuration files (pam.conf)[23C [ FOUND ]
- [2C- PAM configuration files (pam.d)[26C [ FOUND ]
- [2C- PAM modules[46C [ NOT FOUND ]
- [2C- LDAP module in PAM[39C [ NOT FOUND ]
- [2C- Accounts without expire date[29C [ OK ]
- [2C- Accounts without password[32C [ OK ]
- [2C- Checking user password aging (minimum)[19C [ DISABLED ]
- [2C- User password aging (maximum)[28C [ DISABLED ]
- [2C- Checking expired passwords[31C [ OK ]
- [2C- Checking Linux single user mode authentication[11C [ OK ]
- [2C- Determining default umask[32C
- [4C- umask (/etc/profile)[35C [ NOT FOUND ]
- [4C- umask (/etc/login.defs)[32C [ SUGGESTION ]
- [2C- LDAP authentication support[30C [ NOT ENABLED ]
- [2C- Logging failed login attempts[28C [ ENABLED ]
- [+] Shells
- ------------------------------------
- [2C- Checking shells from /etc/shells[25C
- [4CResult: found 4 shells (valid shells: 4).[16C
- [4C- Session timeout settings/tools[25C [ NONE ]
- [2C- Checking default umask values[28C
- [4C- Checking default umask in /etc/bash.bashrc[13C [ NONE ]
- [4C- Checking default umask in /etc/profile[17C [ NONE ]
- [+] File systems
- ------------------------------------
- [2C- Query swap partitions (fstab)[28C [ NONE ]
- [2C- Testing swap partitions[34C [ OK ]
- [2C- Testing /proc mount (hidepid)[28C [ SUGGESTION ]
- [2C- Checking for old files in /tmp[27C [ OK ]
- [2C- Checking /tmp sticky bit[33C [ OK ]
- [2C- ACL support root file system[29C [ ENABLED ]
- [2C- Mount options of /[39C [ NON DEFAULT ]
- [2C- Mount options of /boot[35C [ NON DEFAULT ]
- [2C- Disable kernel support of some filesystems[15C
- [4C- Discovered kernel modules: hfs hfsplus jffs2 squashfs udf [0C
- [+] Storage
- ------------------------------------
- [2C- Checking USB devices authorization[23C [ ENABLED ]
- [+] NFS
- ------------------------------------
- [2C- Query rpc registered programs[28C [ DONE ]
- [2C- Query NFS versions[39C [ DONE ]
- [2C- Query NFS protocols[38C [ DONE ]
- [2C- Check running NFS daemon[33C [ NOT FOUND ]
- [+] Name services
- ------------------------------------
- [2C- Checking default DNS search domain[23C [ FOUND ]
- [2C- Checking /etc/hosts[38C
- [4C- Checking /etc/hosts (duplicates)[23C [ OK ]
- [4C- Checking /etc/hosts (hostname)[25C [ OK ]
- [4C- Checking /etc/hosts (localhost)[24C [ OK ]
- [+] Ports and packages
- ------------------------------------
- [2C- Searching package managers[31C
- [4C- Searching dpkg package manager[25C [ FOUND ]
- [6C- Querying package manager[29C
- [4C- Query unpurged packages[32C [ FOUND ]
- [4C- debsecan utility[39C [ FOUND ]
- [6C- debsecan cron job[36C [ FOUND ]
- [4C- debsums utility[40C [ FOUND ]
- [6C- Cron job for debsums[33C [ FOUND ]
- [2C- Checking vulnerable packages (apt-get only)[14C [ DONE ]
- [2C- Checking package audit tool[30C [ INSTALLED ]
- [4CFound: apt-get[43C
- [+] Networking
- ------------------------------------
- [2C- Checking IPv6 configuration[30C [ ENABLED ]
- [6CConfiguration method[35C [ AUTO ]
- [6CIPv6 only[46C [ NO ]
- [2C- Checking configured nameservers[26C
- [4C- Testing nameservers[36C
- [8CNameserver: 127.0.0.1[32C [ OK ]
- [2C- Checking default gateway[33C [ DONE ]
- [2C- Getting listening ports (TCP/UDP)[24C [ DONE ]
- [6C* Found 20 ports[39C
- [2C- Checking promiscuous interfaces[26C [ OK ]
- [2C- Checking waiting connections[29C [ OK ]
- [2C- Checking status DHCP client[30C [ NOT ACTIVE ]
- [2C- Checking for ARP monitoring software[21C [ NOT FOUND ]
- [+] Printers and Spools
- ------------------------------------
- [2C- Checking cups daemon[37C [ NOT FOUND ]
- [2C- Checking lp daemon[39C [ NOT RUNNING ]
- [+] Software: e-mail and messaging
- ------------------------------------
- [2C- Checking Exim status[37C [ NOT FOUND ]
- [2C- Checking Postfix status[34C [ RUNNING ]
- [2C- Checking Postfix configuration[27C [ FOUND ]
- [4C- Postfix banner[41C [ WARNING ]
- [2C- Checking Dovecot status[34C [ NOT FOUND ]
- [2C- Checking Qmail status[36C [ NOT FOUND ]
- [2C- Checking Sendmail status[33C [ NOT FOUND ]
- [+] Software: firewalls
- ------------------------------------
- [2C- Checking iptables kernel module[26C [ FOUND ]
- [4C- Checking iptables policies of chains[19C [ FOUND ]
- [4C- Checking for empty ruleset[29C [ OK ]
- [2C- Checking host based firewall[29C [ ACTIVE ]
- [+] Software: webserver
- ------------------------------------
- [2C- Checking Apache (binary /usr/sbin/apache2)[15C [ FOUND ]
- [6CInfo: Found 3 virtual hosts[28C
- [4C* Loadable modules[39C [ FOUND ]
- [8C- Found 116 loadable modules[25C
- [10CModSecurity: web application firewall[14C [ FOUND ]
- [2C- Checking nginx[43C [ NOT FOUND ]
- [+] SSH Support
- ------------------------------------
- [2C- Checking running SSH daemon[30C [ FOUND ]
- [4C- Searching SSH configuration[28C [ FOUND ]
- [4C- SSH option: AllowTcpForwarding[25C [ SUGGESTION ]
- [4C- SSH option: ClientAliveCountMax[24C [ SUGGESTION ]
- [4C- SSH option: ClientAliveInterval[24C [ OK ]
- [4C- SSH option: Compression[32C [ SUGGESTION ]
- [4C- SSH option: FingerprintHash[28C [ OK ]
- [4C- SSH option: GatewayPorts[31C [ OK ]
- [4C- SSH option: IgnoreRhosts[31C [ OK ]
- [4C- SSH option: LoginGraceTime[29C [ OK ]
- [4C- SSH option: LogLevel[35C [ SUGGESTION ]
- [4C- SSH option: MaxAuthTries[31C [ SUGGESTION ]
- [4C- SSH option: MaxSessions[32C [ SUGGESTION ]
- [4C- SSH option: PermitRootLogin[28C [ SUGGESTION ]
- [4C- SSH option: PermitUserEnvironment[22C [ OK ]
- [4C- SSH option: PermitTunnel[31C [ OK ]
- [4C- SSH option: Port[39C [ SUGGESTION ]
- [4C- SSH option: PrintLastLog[31C [ OK ]
- [4C- SSH option: Protocol[35C [ NOT FOUND ]
- [4C- SSH option: StrictModes[32C [ OK ]
- [4C- SSH option: TCPKeepAlive[31C [ SUGGESTION ]
- [4C- SSH option: UseDNS[37C [ OK ]
- [4C- SSH option: UsePrivilegeSeparation[21C [ OK ]
- [4C- SSH option: VerifyReverseMapping[23C [ NOT FOUND ]
- [4C- SSH option: X11Forwarding[30C [ SUGGESTION ]
- [4C- SSH option: AllowAgentForwarding[23C [ SUGGESTION ]
- [4C- SSH option: AllowUsers[33C [ NOT FOUND ]
- [4C- SSH option: AllowGroups[32C [ NOT FOUND ]
- [+] SNMP Support
- ------------------------------------
- [2C- Checking running SNMP daemon[29C [ NOT FOUND ]
- [+] Databases
- ------------------------------------
- [2C- MySQL process status[37C [ FOUND ]
- [2C- Redis (server) status[36C [ FOUND ]
- [4C- Redis (requirepass configured)[25C [ FOUND ]
- [4C- Redis (rename of CONFIG command)[23C [ FOUND ]
- [4C- Redis (bind on localhost)[30C [ FOUND ]
- [+] LDAP Services
- ------------------------------------
- [2C- Checking OpenLDAP instance[31C [ NOT FOUND ]
- [+] PHP
- ------------------------------------
- [2C- Checking PHP[45C [ NOT FOUND ]
- [+] Squid Support
- ------------------------------------
- [2C- Checking running Squid daemon[28C [ NOT FOUND ]
- [+] Logging and files
- ------------------------------------
- [2C- Checking for a running log daemon[24C [ OK ]
- [4C- Checking Syslog-NG status[30C [ NOT FOUND ]
- [4C- Checking systemd journal status[24C [ FOUND ]
- [4C- Checking Metalog status[32C [ NOT FOUND ]
- [4C- Checking RSyslog status[32C [ FOUND ]
- [4C- Checking RFC 3195 daemon status[24C [ NOT FOUND ]
- [4C- Checking minilogd instances[28C [ NOT FOUND ]
- [2C- Checking logrotate presence[30C [ OK ]
- [2C- Checking log directories (static list)[19C [ DONE ]
- [2C- Checking open log files[34C [ DONE ]
- [2C- Checking deleted files in use[28C [ FILES FOUND ]
- [+] Insecure services
- ------------------------------------
- [2C- Checking inetd status[36C [ NOT ACTIVE ]
- [+] Banners and identification
- ------------------------------------
- [2C- /etc/issue[47C [ FOUND ]
- [4C- /etc/issue contents[36C [ WEAK ]
- [2C- /etc/issue.net[43C [ FOUND ]
- [4C- /etc/issue.net contents[32C [ WEAK ]
- [+] Scheduled tasks
- ------------------------------------
- [2C- Checking crontab/cronjob[33C [ DONE ]
- [+] Accounting
- ------------------------------------
- [2C- Checking accounting information[26C [ NOT FOUND ]
- [2C- Checking sysstat accounting data[25C [ NOT FOUND ]
- [+] Time and Synchronization
- ------------------------------------
- [2C- NTP daemon found: systemd (timesyncd)[20C [ FOUND ]
- [2C- Checking for a running NTP daemon or client[14C [ OK ]
- [+] Cryptography
- ------------------------------------
- [2C- Checking for expired SSL certificates[20C [ NONE ]
- [+] Virtualization
- ------------------------------------
- [+] Containers
- ------------------------------------
- [+] Security frameworks
- ------------------------------------
- [2C- Checking presence AppArmor[31C [ NOT FOUND ]
- [2C- Checking presence SELinux[32C [ NOT FOUND ]
- [2C- Checking presence grsecurity[29C [ NOT FOUND ]
- [2C- Checking for implemented MAC framework[19C [ NONE ]
- [+] Software: file integrity
- ------------------------------------
- [2C- Checking file integrity tools[28C
- [2C- Checking presence integrity tool[25C [ NOT FOUND ]
- [+] Software: System tooling
- ------------------------------------
- [2C- Checking presence of Fail2ban[28C [ FOUND ]
- WARNING 'backend' not defined in 'ssh'. Using default one: 'auto'
- WARNING 'backend' not defined in 'nextcloud'. Using default one: 'auto'
- [4C- Checking Fail2ban jails[32C [ ENABLED ]
- [2C- Checking for IDS/IPS tooling[29C [ FOUND ]
- [+] Software: Malware
- ------------------------------------
- [+] File Permissions
- ------------------------------------
- [2C- Starting file permissions check[26C
- [4C/etc/lilo.conf[43C [ NOT FOUND ]
- [4C/root/.ssh[47C [ OK ]
- [4C/etc/lilo.conf[43C [ NOT FOUND ]
- [4C/root/.ssh[47C [ OK ]
- [+] Home directories
- ------------------------------------
- [2C- Checking shell history files[29C [ OK ]
- [+] Kernel Hardening
- ------------------------------------
- [2C- Comparing sysctl key pairs with scan profile[13C
- [4C- kernel.core_uses_pid (exp: 1)[26C [ DIFFERENT ]
- [4C- kernel.ctrl-alt-del (exp: 0)[27C [ OK ]
- [4C- kernel.kptr_restrict (exp: 2)[26C [ DIFFERENT ]
- [4C- kernel.randomize_va_space (exp: 2)[21C [ OK ]
- [4C- kernel.sysrq (exp: 0)[34C [ DIFFERENT ]
- [4C- net.ipv4.conf.all.accept_redirects (exp: 0)[12C [ OK ]
- [4C- net.ipv4.conf.all.accept_source_route (exp: 0)[9C [ OK ]
- [4C- net.ipv4.conf.all.bootp_relay (exp: 0)[17C [ OK ]
- [4C- net.ipv4.conf.all.forwarding (exp: 0)[18C [ OK ]
- [4C- net.ipv4.conf.all.log_martians (exp: 1)[16C [ DIFFERENT ]
- [4C- net.ipv4.conf.all.mc_forwarding (exp: 0)[15C [ OK ]
- [4C- net.ipv4.conf.all.proxy_arp (exp: 0)[19C [ OK ]
- [4C- net.ipv4.conf.all.rp_filter (exp: 1)[19C [ OK ]
- [4C- net.ipv4.conf.all.send_redirects (exp: 0)[14C [ DIFFERENT ]
- [4C- net.ipv4.conf.default.accept_redirects (exp: 0)[8C [ OK ]
- [4C- net.ipv4.conf.default.accept_source_route (exp: 0)[5C [ OK ]
- [4C- net.ipv4.conf.default.log_martians (exp: 1)[12C [ DIFFERENT ]
- [4C- net.ipv4.icmp_echo_ignore_broadcasts (exp: 1)[10C [ OK ]
- [4C- net.ipv4.icmp_ignore_bogus_error_responses (exp: 1)[4C [ OK ]
- [4C- net.ipv4.tcp_syncookies (exp: 1)[23C [ OK ]
- [4C- net.ipv4.tcp_timestamps (exp: 0)[23C [ DIFFERENT ]
- [4C- net.ipv6.conf.all.accept_redirects (exp: 0)[12C [ OK ]
- [4C- net.ipv6.conf.all.accept_source_route (exp: 0)[9C [ OK ]
- [4C- net.ipv6.conf.default.accept_redirects (exp: 0)[8C [ OK ]
- [4C- net.ipv6.conf.default.accept_source_route (exp: 0)[5C [ OK ]
- [+] Hardening
- ------------------------------------
- [4C- Installed compiler(s)[34C [ FOUND ]
- [4C- Installed malware scanner[30C [ NOT FOUND ]
- [4C- Installed malware scanner[30C [ NOT FOUND ]
- [+] Custom Tests
- ------------------------------------
- [2C- Running custom tests... [33C [ NONE ]
- [+] Plugins (phase 2)
- ------------------------------------
- ================================================================================
- -[ Lynis 2.4.0 Results ]-
- Warnings (2):
- ----------------------------
- ! Version of Lynis is very old and should be updated [LYNIS]
- https://cisofy.com/controls/LYNIS/
- ! Found mail_name in SMTP banner, and/or mail_name contains 'Postfix' [MAIL-8818]
- https://cisofy.com/controls/MAIL-8818/
- Suggestions (30):
- ----------------------------
- * Install libpam-tmpdir to set $TMP and $TMPDIR for PAM sessions [CUST-0280]
- https://your-domain.example.org/controls/CUST-0280/
- * Install libpam-usb to enable multi-factor authentication for PAM sessions [CUST-0285]
- https://your-domain.example.org/controls/CUST-0285/
- * Install needrestart, alternatively to debian-goodies, so that you can run needrestart after upgrades to determine which daemons are using old versions of libraries and need restarting. [CUST-0831]
- https://your-domain.example.org/controls/CUST-0831/
- * Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [AUTH-9262]
- https://cisofy.com/controls/AUTH-9262/
- * Configure minimum password age in /etc/login.defs [AUTH-9286]
- https://cisofy.com/controls/AUTH-9286/
- * Configure maximum password age in /etc/login.defs [AUTH-9286]
- https://cisofy.com/controls/AUTH-9286/
- * Default umask in /etc/login.defs could be more strict like 027 [AUTH-9328]
- https://cisofy.com/controls/AUTH-9328/
- * Purge old/removed packages (14 found) with aptitude purge or dpkg --purge command. This will cleanup old configuration files, cron jobs and startup scripts. [PKGS-7346]
- https://cisofy.com/controls/PKGS-7346/
- * Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]
- https://cisofy.com/controls/NETW-3032/
- * You are advised to hide the mail_name (option: smtpd_banner) from your postfix configuration. Use postconf -e or change your main.cf file (/etc/postfix/main.cf) [MAIL-8818]
- https://cisofy.com/controls/MAIL-8818/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : AllowTcpForwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : ClientAliveCountMax (3 --> 2)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : Compression (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : LogLevel (INFO --> VERBOSE)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : MaxAuthTries (6 --> 1)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : MaxSessions (10 --> 2)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : PermitRootLogin (WITHOUT-PASSWORD --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : Port (22 --> )
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : TCPKeepAlive (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : X11Forwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : AllowAgentForwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Check what deleted files are still in use and why. [LOGG-2190]
- https://cisofy.com/controls/LOGG-2190/
- * Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
- https://cisofy.com/controls/BANN-7126/
- * Add legal banner to /etc/issue.net, to warn unauthorized users [BANN-7130]
- https://cisofy.com/controls/BANN-7130/
- * Enable process accounting [ACCT-9622]
- https://cisofy.com/controls/ACCT-9622/
- * Enable sysstat to collect accounting (no results) [ACCT-9626]
- https://cisofy.com/controls/ACCT-9626/
- * Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
- https://cisofy.com/controls/FINT-4350/
- * One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
- https://cisofy.com/controls/KRNL-6000/
- * Harden compilers like restricting access to root user only [HRDN-7222]
- https://cisofy.com/controls/HRDN-7222/
- * Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
- - Solution : Install a tool like rkhunter, chkrootkit, OSSEC
- https://cisofy.com/controls/HRDN-7230/
- Follow-up:
- ----------------------------
- - Show details of a test (lynis show details TEST-ID)
- - Check the logfile for all details (less /var/log/lynis.log)
- - Read security controls texts (https://cisofy.com)
- - Use --upload to upload data to central system (Lynis Enterprise users)
- ================================================================================
- Lynis security scan details:
- Hardening index : 65 [############# ]
- Tests performed : 205
- Plugins enabled : 1
- Components:
- - Firewall [V]
- - Malware scanner [X]
- Lynis Modules:
- - Compliance Status [?]
- - Security Audit [V]
- - Vulnerability Scan [V]
- Files:
- - Test and debug information : /var/log/lynis.log
- - Report data : /var/log/lynis-report.dat
- ================================================================================
- Notice: Lynis update available
- Current version : 240 Latest version : 266
- ================================================================================
- Lynis 2.4.0
- Auditing, system hardening, and compliance for UNIX-based systems
- (Linux, macOS, BSD, and others)
- 2007-2016, CISOfy - https://cisofy.com/lynis/
- Enterprise support available (compliance, plugins, interface and tools)
- ================================================================================
- [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
- Known vulnerabilities in this system
- CVE-2017-14160 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2016-10317 libgs9-common (remotely exploitable, medium urgency)
- CVE-2018-10194 libgs9-common (remotely exploitable, medium urgency)
- CVE-2018-11645 libgs9-common (remotely exploitable, low urgency)
- CVE-2017-7272 php7.0-mysql (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-mysql (remotely exploitable, high urgency)
- CVE-2017-17087 vim-tiny (low urgency)
- CVE-2018-10754 libncurses5 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5core5a (remotely exploitable, medium urgency)
- CVE-2018-1060 python3.5 (low urgency)
- CVE-2018-1061 python3.5 (low urgency)
- CVE-2017-10268 mariadb-common (low urgency)
- CVE-2017-10378 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-common (medium urgency)
- CVE-2017-3641 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-common (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-common (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-common (low urgency)
- CVE-2018-2761 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-12613 libapr1 (low urgency)
- CVE-2017-1000445 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-1000476 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-11531 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11532 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11534 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11539 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11644 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11724 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11751 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11752 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12140 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12418 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12427 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12429 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12430 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12433 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12435 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12563 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12564 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12565 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12566 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12641 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12642 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12643 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12654 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12664 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12665 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12668 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12670 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12674 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12675 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12676 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12691 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12692 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12693 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12875 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-13061 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13133 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-13146 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13658 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13768 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14060 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14172 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14173 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14174 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14175 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14249 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14341 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14400 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14505 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14528 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14532 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14624 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14625 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14626 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14739 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14741 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-15015 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-15016 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-15017 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-15217 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-15281 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-17681 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-17682 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-17914 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-18209 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18211 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18252 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18271 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-18273 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2018-10177 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-10804 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-10805 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-14551 imagemagick-6-common
- CVE-2018-7443 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-8804 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2018-8960 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2018-9133 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-1000030 idle-python2.7 (remotely exploitable, medium urgency)
- CVE-2018-1060 idle-python2.7 (low urgency)
- CVE-2018-1061 idle-python2.7 (low urgency)
- CVE-2018-10754 ncurses-term (remotely exploitable, low urgency)
- CVE-2018-4117 chromium-browser (remotely exploitable, medium urgency)
- CVE-2017-7475 libcairo2 (remotely exploitable, low urgency)
- CVE-2017-9814 libcairo2 (remotely exploitable, low urgency)
- CVE-2018-10754 libtinfo5 (remotely exploitable, low urgency)
- CVE-2017-13135 libx265-95 (remotely exploitable, medium urgency)
- CVE-2018-1049 libudev1 (remotely exploitable, medium urgency)
- CVE-2018-6954 libudev1 (high urgency)
- CVE-2016-9811 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-5837 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-5844 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-11462 libk5crypto3 (remotely exploitable, low urgency)
- CVE-2018-5710 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2018-5729 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2018-5730 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2016-10040 libqt5dbus5 (remotely exploitable, medium urgency)
- CVE-2017-10268 mariadb-client-10.1 (low urgency)
- CVE-2017-10378 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-client-10.1 (medium urgency)
- CVE-2017-3641 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-client-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-client-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-client-10.1 (low urgency)
- CVE-2018-2761 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-7272 php7.0-ldap (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-ldap (remotely exploitable, high urgency)
- CVE-2017-10971 xserver-common (remotely exploitable, medium urgency)
- CVE-2017-10972 xserver-common (remotely exploitable, medium urgency)
- CVE-2017-12176 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12177 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12178 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12179 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12180 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12181 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12182 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12183 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12184 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12185 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12186 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12187 xserver-common (remotely exploitable, high urgency)
- CVE-2017-13721 xserver-common (low urgency)
- CVE-2017-13723 xserver-common (medium urgency)
- CVE-2017-11671 gcc-4.8-base (low urgency)
- CVE-2017-7272 php7.0-readline (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-readline (remotely exploitable, high urgency)
- CVE-2016-10517 redis-tools (remotely exploitable, medium urgency)
- CVE-2018-6594 python-crypto (remotely exploitable, medium urgency)
- CVE-2016-9112 libopenjp2-7 (remotely exploitable, medium urgency)
- CVE-2017-17480 libopenjp2-7 (remotely exploitable, high urgency)
- CVE-2018-14423 libopenjp2-7 (low urgency)
- CVE-2018-5727 libopenjp2-7 (remotely exploitable, low urgency)
- CVE-2018-5785 libopenjp2-7 (remotely exploitable, low urgency)
- CVE-2018-6616 libopenjp2-7 (remotely exploitable, medium urgency)
- CVE-2016-10228 libc6-dbg (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc6-dbg (high urgency)
- CVE-2017-1000409 libc6-dbg (medium urgency)
- CVE-2017-12132 libc6-dbg (remotely exploitable, medium urgency)
- CVE-2017-15670 libc6-dbg (remotely exploitable, high urgency)
- CVE-2017-15671 libc6-dbg (remotely exploitable, medium urgency)
- CVE-2017-15804 libc6-dbg (remotely exploitable, low urgency)
- CVE-2017-16997 libc6-dbg (remotely exploitable, high urgency)
- CVE-2017-18269 libc6-dbg (remotely exploitable, high urgency)
- CVE-2018-1000001 libc6-dbg (high urgency)
- CVE-2018-11236 libc6-dbg (remotely exploitable, low urgency)
- CVE-2018-11237 libc6-dbg (low urgency)
- CVE-2018-6485 libc6-dbg (remotely exploitable, high urgency)
- CVE-2018-6551 libc6-dbg (remotely exploitable, high urgency)
- CVE-2017-12678 libtag1v5 (remotely exploitable, medium urgency)
- CVE-2018-11439 libtag1v5 (remotely exploitable, medium urgency)
- CVE-2018-1049 libpam-systemd (remotely exploitable, medium urgency)
- CVE-2018-6954 libpam-systemd (high urgency)
- CVE-2016-10040 libqt5widgets5 (remotely exploitable, medium urgency)
- CVE-2017-18198 libcdio13 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio13 (remotely exploitable, low urgency)
- CVE-2017-7272 php7.0-opcache (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-opcache (remotely exploitable, high urgency)
- CVE-2016-10040 libqt5network5 (remotely exploitable, medium urgency)
- CVE-2017-1000445 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickcore-6.q16-3
- CVE-2018-7443 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15232 libjpeg62-turbo (remotely exploitable, low urgency)
- CVE-2018-1152 libjpeg62-turbo (low urgency)
- CVE-2017-10268 mariadb-server-core-10.1 (low urgency)
- CVE-2017-10378 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server-core-10.1 (medium urgency)
- CVE-2017-3641 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server-core-10.1 (low urgency)
- CVE-2018-2761 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-7272 php7.0-mbstring (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-mbstring (remotely exploitable, high urgency)
- CVE-2016-1516 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2017-11464 librsvg2-2 (remotely exploitable, medium urgency)
- CVE-2018-1000168 libnghttp2-14 (remotely exploitable, low urgency)
- CVE-2017-11399 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14055 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14056 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14057 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14058 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14169 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14171 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14222 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14223 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14225 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-17081 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavresample3 (low urgency)
- CVE-2018-12459 libavresample3 (low urgency)
- CVE-2018-13300 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavresample3 (remotely exploitable, low urgency)
- CVE-2018-13302 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13305 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavresample3
- CVE-2018-14395 libavresample3
- CVE-2018-1999010 libavresample3
- CVE-2018-1999011 libavresample3
- CVE-2018-1999012 libavresample3
- CVE-2018-1999013 libavresample3
- CVE-2018-6392 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavresample3 (remotely exploitable, low urgency)
- CVE-2018-7557 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavresample3 (remotely exploitable, low urgency)
- CVE-2017-11399 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14055 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14056 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14057 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14058 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14169 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14171 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14222 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14223 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14225 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-17081 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavutil55 (low urgency)
- CVE-2018-12459 libavutil55 (low urgency)
- CVE-2018-13300 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-13302 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13305 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavutil55
- CVE-2018-14395 libavutil55
- CVE-2018-1999010 libavutil55
- CVE-2018-1999011 libavutil55
- CVE-2018-1999012 libavutil55
- CVE-2018-1999013 libavutil55
- CVE-2018-6392 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-7557 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-13440 libaudiofile1 (low urgency)
- CVE-2017-17087 xxd (low urgency)
- CVE-2017-7272 php7.0 (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0 (remotely exploitable, high urgency)
- CVE-2018-14048 libpng16-16
- CVE-2017-14617 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-14926 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-14928 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-18267 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2018-13988 libpoppler-qt5-1 (low urgency)
- CVE-2018-10754 libncursesw5 (remotely exploitable, low urgency)
- CVE-2017-12618 libaprutil1-dbd-sqlite3 (low urgency)
- CVE-2018-10017 libopenmpt0 (remotely exploitable, medium urgency)
- CVE-2018-11710 libopenmpt0 (remotely exploitable, medium urgency)
- CVE-2016-2779 libuuid1 (high urgency)
- CVE-2016-10209 libarchive13 (remotely exploitable, medium urgency)
- CVE-2016-10349 libarchive13 (remotely exploitable, medium urgency)
- CVE-2016-10350 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14166 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14501 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14502 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14503 libarchive13 (remotely exploitable, medium urgency)
- CVE-2018-6594 python3-crypto (remotely exploitable, medium urgency)
- CVE-2017-13884 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-13885 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7018 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7030 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7034 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7037 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7039 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7046 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7048 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7055 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
- CVE-2017-7056 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
- CVE-2017-7061 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
- CVE-2017-7064 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7153 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7160 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7161 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7165 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4088 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4089 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4096 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2016-2568 libpolkit-agent-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-agent-1-0
- CVE-2018-14048 libpng-tools
- CVE-2017-10268 mariadb-client-core-10.1 (low urgency)
- CVE-2017-10378 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-client-core-10.1 (medium urgency)
- CVE-2017-3641 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-client-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-client-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-client-core-10.1 (low urgency)
- CVE-2018-2761 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2016-2568 policykit-1 (medium urgency)
- CVE-2018-1116 policykit-1
- CVE-2018-1060 libpython3.5 (low urgency)
- CVE-2018-1061 libpython3.5 (low urgency)
- CVE-2014-7913 dhcpcd5 (remotely exploitable, medium urgency)
- CVE-2014-2886 gksu (remotely exploitable, medium urgency)
- CVE-2016-10228 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-1000408 multiarch-support (high urgency)
- CVE-2017-1000409 multiarch-support (medium urgency)
- CVE-2017-12132 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-15670 multiarch-support (remotely exploitable, high urgency)
- CVE-2017-15671 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-15804 multiarch-support (remotely exploitable, low urgency)
- CVE-2017-16997 multiarch-support (remotely exploitable, high urgency)
- CVE-2017-18269 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-1000001 multiarch-support (high urgency)
- CVE-2018-11236 multiarch-support (remotely exploitable, low urgency)
- CVE-2018-11237 multiarch-support (low urgency)
- CVE-2018-6485 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-6551 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-1049 systemd-sysv (remotely exploitable, medium urgency)
- CVE-2018-6954 systemd-sysv (high urgency)
- CVE-2017-18198 libcdio-cdda1 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio-cdda1 (remotely exploitable, low urgency)
- CVE-2017-14617 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-14926 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-14928 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-18267 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2018-13988 libpoppler64 (low urgency)
- CVE-2018-9234 gpgv (remotely exploitable, low urgency)
- CVE-2018-1060 libpython3.5-stdlib (low urgency)
- CVE-2018-1061 libpython3.5-stdlib (low urgency)
- CVE-2017-11399 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14055 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14056 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14057 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14058 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14169 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14171 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14222 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14223 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14225 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-17081 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavfilter6 (low urgency)
- CVE-2018-12459 libavfilter6 (low urgency)
- CVE-2018-13300 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-13302 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13305 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavfilter6
- CVE-2018-14395 libavfilter6
- CVE-2018-1999010 libavfilter6
- CVE-2018-1999011 libavfilter6
- CVE-2018-1999012 libavfilter6
- CVE-2018-1999013 libavfilter6
- CVE-2018-6392 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-7557 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavfilter6 (remotely exploitable, low urgency)
- CVE-2016-2779 bsdutils (high urgency)
- CVE-2017-16612 libwayland-client0 (remotely exploitable, medium urgency)
- CVE-2018-10906 libfuse2
- CVE-2017-11399 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14055 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14056 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14057 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14058 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14169 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14171 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14222 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14223 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14225 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-17081 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavcodec57 (low urgency)
- CVE-2018-12459 libavcodec57 (low urgency)
- CVE-2018-13300 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavcodec57 (remotely exploitable, low urgency)
- CVE-2018-13302 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13305 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavcodec57
- CVE-2018-14395 libavcodec57
- CVE-2018-1999010 libavcodec57
- CVE-2018-1999011 libavcodec57
- CVE-2018-1999012 libavcodec57
- CVE-2018-1999013 libavcodec57
- CVE-2018-6392 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavcodec57 (remotely exploitable, low urgency)
- CVE-2018-7557 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavcodec57 (remotely exploitable, low urgency)
- CVE-2017-7475 libcairo-gobject2 (remotely exploitable, low urgency)
- CVE-2017-9814 libcairo-gobject2 (remotely exploitable, low urgency)
- CVE-2016-9797 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9798 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9799 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9800 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9801 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9802 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9803 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9804 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9917 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9918 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2017-1000250 libbluetooth3 (remotely exploitable, low urgency)
- CVE-2018-10910 libbluetooth3
- CVE-2018-1060 python3.5-venv (low urgency)
- CVE-2018-1061 python3.5-venv (low urgency)
- CVE-2018-9234 gnupg (remotely exploitable, low urgency)
- CVE-2018-12910 libsoup2.4-1
- CVE-2018-1000035 unzip (remotely exploitable, medium urgency)
- CVE-2016-10723 linux-libc-dev
- CVE-2016-8660 linux-libc-dev (low urgency)
- CVE-2017-18232 linux-libc-dev (low urgency)
- CVE-2017-18249 linux-libc-dev (medium urgency)
- CVE-2017-18255 linux-libc-dev (medium urgency)
- CVE-2017-5753 linux-libc-dev (medium urgency)
- CVE-2018-1000026 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-1000204 linux-libc-dev
- CVE-2018-10021 linux-libc-dev (medium urgency)
- CVE-2018-10087 linux-libc-dev (low urgency)
- CVE-2018-10124 linux-libc-dev (low urgency)
- CVE-2018-10322 linux-libc-dev (medium urgency)
- CVE-2018-10853 linux-libc-dev
- CVE-2018-10876 linux-libc-dev
- CVE-2018-10877 linux-libc-dev
- CVE-2018-10878 linux-libc-dev
- CVE-2018-10879 linux-libc-dev
- CVE-2018-10880 linux-libc-dev
- CVE-2018-10881 linux-libc-dev
- CVE-2018-10882 linux-libc-dev
- CVE-2018-10883 linux-libc-dev
- CVE-2018-10940 linux-libc-dev (medium urgency)
- CVE-2018-1108 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-1118 linux-libc-dev (low urgency)
- CVE-2018-1120 linux-libc-dev
- CVE-2018-1130 linux-libc-dev (medium urgency)
- CVE-2018-11506 linux-libc-dev (high urgency)
- CVE-2018-12233 linux-libc-dev
- CVE-2018-12928 linux-libc-dev
- CVE-2018-13053 linux-libc-dev
- CVE-2018-13094 linux-libc-dev
- CVE-2018-13096 linux-libc-dev
- CVE-2018-13099 linux-libc-dev
- CVE-2018-13405 linux-libc-dev
- CVE-2018-3639 linux-libc-dev (medium urgency)
- CVE-2018-5814 linux-libc-dev
- CVE-2018-6412 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-7273 linux-libc-dev (medium urgency)
- CVE-2018-7755 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2016-2779 mount (high urgency)
- CVE-2017-9218 libfaad2 (remotely exploitable, medium urgency)
- CVE-2017-9219 libfaad2 (remotely exploitable, medium urgency)
- CVE-2017-9220 libfaad2 (remotely exploitable, medium urgency)
- CVE-2017-9221 libfaad2 (remotely exploitable, medium urgency)
- CVE-2017-9222 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-9223 libfaad2 (remotely exploitable, medium urgency)
- CVE-2017-9253 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-9254 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-9255 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-9256 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-9257 libfaad2 (remotely exploitable, high urgency)
- CVE-2017-6888 libflac8 (remotely exploitable, low urgency)
- CVE-2018-1049 libsystemd0 (remotely exploitable, medium urgency)
- CVE-2018-6954 libsystemd0 (high urgency)
- CVE-2017-7272 php7.0-gd (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-gd (remotely exploitable, high urgency)
- CVE-2016-10228 libc6 (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc6 (high urgency)
- CVE-2017-1000409 libc6 (medium urgency)
- CVE-2017-12132 libc6 (remotely exploitable, medium urgency)
- CVE-2017-15670 libc6 (remotely exploitable, high urgency)
- CVE-2017-15671 libc6 (remotely exploitable, medium urgency)
- CVE-2017-15804 libc6 (remotely exploitable, low urgency)
- CVE-2017-16997 libc6 (remotely exploitable, high urgency)
- CVE-2017-18269 libc6 (remotely exploitable, high urgency)
- CVE-2018-1000001 libc6 (high urgency)
- CVE-2018-11236 libc6 (remotely exploitable, low urgency)
- CVE-2018-11237 libc6 (low urgency)
- CVE-2018-6485 libc6 (remotely exploitable, high urgency)
- CVE-2018-6551 libc6 (remotely exploitable, high urgency)
- CVE-2018-1000030 python2.7 (remotely exploitable, medium urgency)
- CVE-2018-1060 python2.7 (low urgency)
- CVE-2018-1061 python2.7 (low urgency)
- CVE-2018-5711 libgd3 (remotely exploitable, medium urgency)
- CVE-2017-16611 libxfont2 (low urgency)
- CVE-2018-1060 idle-python3.5 (low urgency)
- CVE-2018-1061 idle-python3.5 (low urgency)
- CVE-2017-11613 libtiff5 (remotely exploitable, medium urgency)
- CVE-2017-17942 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-10963 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-12900 libtiff5
- CVE-2018-14373 libtiff5
- CVE-2018-14374 libtiff5
- CVE-2018-14375 libtiff5
- CVE-2018-14378 libtiff5
- CVE-2018-5360 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-5784 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-7456 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-8905 libtiff5 (remotely exploitable, medium urgency)
- CVE-2016-2779 libfdisk1 (high urgency)
- CVE-2017-7272 php7.0-mcrypt (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-mcrypt (remotely exploitable, high urgency)
- CVE-2016-3977 libgif7 (remotely exploitable, medium urgency)
- CVE-2018-11489 libgif7 (remotely exploitable, medium urgency)
- CVE-2018-11490 libgif7 (remotely exploitable, medium urgency)
- CVE-2018-12910 libsoup-gnome2.4-1
- CVE-2016-1516 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-core2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-core2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2016-1516 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2017-7272 php7.0-curl (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-curl (remotely exploitable, high urgency)
- CVE-2017-7272 php7.0-cli (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-cli (remotely exploitable, high urgency)
- CVE-2017-1000418 libwildmidi2 (remotely exploitable, medium urgency)
- CVE-2017-11661 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11662 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11663 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11664 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2018-4117 chromium-browser-l10n (remotely exploitable, medium urgency)
- CVE-2016-2781 coreutils (low urgency)
- CVE-2017-12596 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-14988 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9110 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9111 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9112 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9113 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9114 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9115 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9116 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2018-10360 file (remotely exploitable, medium urgency)
- CVE-2017-11399 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-11665 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-11719 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14054 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14055 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14056 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14057 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14058 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14059 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14169 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14170 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14171 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14222 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14223 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14225 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14767 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-15186 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-15672 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-16840 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-17081 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-9608 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-10001 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-12458 libswresample2 (low urgency)
- CVE-2018-12459 libswresample2 (low urgency)
- CVE-2018-13300 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13301 libswresample2 (remotely exploitable, low urgency)
- CVE-2018-13302 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13303 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13304 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13305 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-14394 libswresample2
- CVE-2018-14395 libswresample2
- CVE-2018-1999010 libswresample2
- CVE-2018-1999011 libswresample2
- CVE-2018-1999012 libswresample2
- CVE-2018-1999013 libswresample2
- CVE-2018-6392 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-6621 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-6912 libswresample2 (remotely exploitable, low urgency)
- CVE-2018-7557 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-7751 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-9841 libswresample2 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5printsupport5 (remotely exploitable, medium urgency)
- CVE-2017-11462 libkrb5support0 (remotely exploitable, low urgency)
- CVE-2018-5710 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2018-5729 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2018-5730 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2017-10971 xserver-xorg-core (remotely exploitable, medium urgency)
- CVE-2017-10972 xserver-xorg-core (remotely exploitable, medium urgency)
- CVE-2017-12176 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12177 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12178 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12179 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12180 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12181 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12182 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12183 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12184 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12185 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12186 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12187 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-13721 xserver-xorg-core (low urgency)
- CVE-2017-13723 xserver-xorg-core (medium urgency)
- CVE-2018-1060 libpython3.5-dev (low urgency)
- CVE-2018-1061 libpython3.5-dev (low urgency)
- CVE-2017-11464 librsvg2-common (remotely exploitable, medium urgency)
- CVE-2017-12852 python-numpy (remotely exploitable, medium urgency)
- CVE-2016-9318 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-16932 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-18258 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-5130 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-5969 libxml2 (remotely exploitable, low urgency)
- CVE-2017-8872 libxml2 (remotely exploitable, medium urgency)
- CVE-2018-14404 libxml2
- CVE-2018-14567 libxml2
- CVE-2016-2779 libblkid1 (high urgency)
- CVE-2017-7272 php7.0-fpm (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-fpm (remotely exploitable, high urgency)
- CVE-2018-10360 libmagic-mgc (remotely exploitable, medium urgency)
- CVE-2018-10360 libmagic1 (remotely exploitable, medium urgency)
- CVE-2018-7999 libgraphite2-3 (remotely exploitable, medium urgency)
- CVE-2018-5764 rsync (remotely exploitable, medium urgency)
- CVE-2018-1060 python3.5-minimal (low urgency)
- CVE-2018-1061 python3.5-minimal (low urgency)
- CVE-2017-8834 libcroco3 (remotely exploitable, low urgency)
- CVE-2017-8871 libcroco3 (remotely exploitable, low urgency)
- CVE-2017-11462 libgssapi-krb5-2 (remotely exploitable, low urgency)
- CVE-2018-5710 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2018-5729 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2018-5730 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2016-4607 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4608 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4609 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4610 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2017-2477 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-1516 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2017-14107 libzip4 (remotely exploitable, medium urgency)
- CVE-2016-10040 libqt5sql5-sqlite (remotely exploitable, medium urgency)
- CVE-2017-1000418 libwildmidi-config (remotely exploitable, medium urgency)
- CVE-2017-11661 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11662 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11663 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11664 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-12562 libsndfile1 (remotely exploitable, high urgency)
- CVE-2017-14245 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-14246 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-14634 libsndfile1 (remotely exploitable, medium urgency)
- CVE-2017-17456 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-17457 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-6892 libsndfile1 (remotely exploitable, medium urgency)
- CVE-2018-13419 libsndfile1 (low urgency)
- CVE-2018-0732 libssl1.0.2 (low urgency)
- CVE-2018-0737 libssl1.0.2 (remotely exploitable, low urgency)
- CVE-2017-7272 php7.0-zip (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-zip (remotely exploitable, high urgency)
- CVE-2017-15400 libcupsimage2 (remotely exploitable, high urgency)
- CVE-2017-18190 libcupsimage2 (remotely exploitable, medium urgency)
- CVE-2017-18248 libcupsimage2 (remotely exploitable, low urgency)
- CVE-2018-4180 libcupsimage2
- CVE-2018-4181 libcupsimage2
- CVE-2018-6553 libcupsimage2
- CVE-2017-9216 libjbig2dec0 (remotely exploitable, medium urgency)
- CVE-2016-9811 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2017-5837 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2017-5844 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2017-13712 libmp3lame0 (remotely exploitable, low urgency)
- CVE-2017-15019 libmp3lame0 (remotely exploitable, medium urgency)
- CVE-2015-9262 libxcursor1
- CVE-2018-1000156 patch (remotely exploitable, medium urgency)
- CVE-2017-13704 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14491 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14492 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14493 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14494 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14495 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14496 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-15107 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-12424 passwd (remotely exploitable, high urgency)
- CVE-2018-7169 passwd (remotely exploitable, medium urgency)
- CVE-2016-2568 libpolkit-backend-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-backend-1-0
- CVE-2018-10754 ncurses-base (remotely exploitable, low urgency)
- CVE-2016-10228 libc-bin (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc-bin (high urgency)
- CVE-2017-1000409 libc-bin (medium urgency)
- CVE-2017-12132 libc-bin (remotely exploitable, medium urgency)
- CVE-2017-15670 libc-bin (remotely exploitable, high urgency)
- CVE-2017-15671 libc-bin (remotely exploitable, medium urgency)
- CVE-2017-15804 libc-bin (remotely exploitable, low urgency)
- CVE-2017-16997 libc-bin (remotely exploitable, high urgency)
- CVE-2017-18269 libc-bin (remotely exploitable, high urgency)
- CVE-2018-1000001 libc-bin (high urgency)
- CVE-2018-11236 libc-bin (remotely exploitable, low urgency)
- CVE-2018-11237 libc-bin (low urgency)
- CVE-2018-6485 libc-bin (remotely exploitable, high urgency)
- CVE-2018-6551 libc-bin (remotely exploitable, high urgency)
- CVE-2017-1000445 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickcore-6.q16-3-extra
- CVE-2018-7443 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2016-10040 libqt5xml5 (remotely exploitable, medium urgency)
- CVE-2018-1049 udev (remotely exploitable, medium urgency)
- CVE-2018-6954 udev (high urgency)
- CVE-2017-11399 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-11665 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-11719 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14054 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14055 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14056 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14057 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14058 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14059 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14169 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14170 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14171 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14222 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14223 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14225 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14767 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-15186 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-15672 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-16840 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-17081 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-9608 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-10001 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-12458 libswscale4 (low urgency)
- CVE-2018-12459 libswscale4 (low urgency)
- CVE-2018-13300 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13301 libswscale4 (remotely exploitable, low urgency)
- CVE-2018-13302 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13303 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13304 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13305 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-14394 libswscale4
- CVE-2018-14395 libswscale4
- CVE-2018-1999010 libswscale4
- CVE-2018-1999011 libswscale4
- CVE-2018-1999012 libswscale4
- CVE-2018-1999013 libswscale4
- CVE-2018-6392 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-6621 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-6912 libswscale4 (remotely exploitable, low urgency)
- CVE-2018-7557 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-7751 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-9841 libswscale4 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5gui5 (remotely exploitable, medium urgency)
- CVE-2018-4117 chromium-codecs-ffmpeg-extra (remotely exploitable, medium urgency)
- CVE-2018-0732 libssl1.1 (low urgency)
- CVE-2018-0737 libssl1.1 (remotely exploitable, medium urgency)
- CVE-2017-12618 libaprutil1 (low urgency)
- CVE-2017-7272 php7.0-json (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-json (remotely exploitable, high urgency)
- CVE-2016-10228 libc-l10n (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc-l10n (high urgency)
- CVE-2017-1000409 libc-l10n (medium urgency)
- CVE-2017-12132 libc-l10n (remotely exploitable, medium urgency)
- CVE-2017-15670 libc-l10n (remotely exploitable, high urgency)
- CVE-2017-15671 libc-l10n (remotely exploitable, medium urgency)
- CVE-2017-15804 libc-l10n (remotely exploitable, low urgency)
- CVE-2017-16997 libc-l10n (remotely exploitable, high urgency)
- CVE-2017-18269 libc-l10n (remotely exploitable, high urgency)
- CVE-2018-1000001 libc-l10n (high urgency)
- CVE-2018-11236 libc-l10n (remotely exploitable, low urgency)
- CVE-2018-11237 libc-l10n (low urgency)
- CVE-2018-6485 libc-l10n (remotely exploitable, high urgency)
- CVE-2018-6551 libc-l10n (remotely exploitable, high urgency)
- CVE-2018-1049 systemd (remotely exploitable, medium urgency)
- CVE-2018-6954 systemd (high urgency)
- CVE-2018-1000030 libpython2.7 (remotely exploitable, medium urgency)
- CVE-2018-1060 libpython2.7 (low urgency)
- CVE-2018-1061 libpython2.7 (low urgency)
- CVE-2016-10040 libqt5sql5 (remotely exploitable, medium urgency)
- CVE-2017-1000445 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickwand-6.q16-3
- CVE-2018-7443 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-0732 openssl (low urgency)
- CVE-2018-0737 openssl (remotely exploitable, medium urgency)
- CVE-2017-11399 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-11665 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-11719 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14054 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14055 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14056 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14057 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14058 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14059 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14169 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14170 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14171 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14222 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14223 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14225 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14767 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-15186 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-15672 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-16840 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-17081 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-9608 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-10001 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-12458 libpostproc54 (low urgency)
- CVE-2018-12459 libpostproc54 (low urgency)
- CVE-2018-13300 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13301 libpostproc54 (remotely exploitable, low urgency)
- CVE-2018-13302 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13303 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13304 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13305 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-14394 libpostproc54
- CVE-2018-14395 libpostproc54
- CVE-2018-1999010 libpostproc54
- CVE-2018-1999011 libpostproc54
- CVE-2018-1999012 libpostproc54
- CVE-2018-1999013 libpostproc54
- CVE-2018-6392 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-6621 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-6912 libpostproc54 (remotely exploitable, low urgency)
- CVE-2018-7557 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-7751 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-9841 libpostproc54 (remotely exploitable, low urgency)
- CVE-2017-17087 vim-common (low urgency)
- CVE-2018-8740 libsqlite3-0 (remotely exploitable, medium urgency)
- CVE-2017-13704 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14491 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14492 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14493 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14494 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14495 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14496 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-15107 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-13884 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-13885 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7018 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7030 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7034 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7037 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7039 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7046 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7048 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7055 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
- CVE-2017-7056 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
- CVE-2017-7061 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
- CVE-2017-7064 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7153 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7160 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7161 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7165 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4088 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4089 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4096 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-11462 libkrb5-3 (remotely exploitable, low urgency)
- CVE-2018-5710 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2018-5729 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2018-5730 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2017-11671 gcc-4.9-base (low urgency)
- CVE-2018-1000030 libpython2.7-dev (remotely exploitable, medium urgency)
- CVE-2018-1060 libpython2.7-dev (low urgency)
- CVE-2018-1061 libpython2.7-dev (low urgency)
- CVE-2017-12448 binutils (remotely exploitable, medium urgency)
- CVE-2017-12449 binutils (remotely exploitable, medium urgency)
- CVE-2017-12450 binutils (remotely exploitable, medium urgency)
- CVE-2017-12451 binutils (remotely exploitable, medium urgency)
- CVE-2017-12452 binutils (remotely exploitable, medium urgency)
- CVE-2017-12453 binutils (remotely exploitable, medium urgency)
- CVE-2017-12454 binutils (remotely exploitable, medium urgency)
- CVE-2017-12455 binutils (remotely exploitable, medium urgency)
- CVE-2017-12456 binutils (remotely exploitable, medium urgency)
- CVE-2017-12457 binutils (remotely exploitable, medium urgency)
- CVE-2017-12458 binutils (remotely exploitable, medium urgency)
- CVE-2017-12459 binutils (remotely exploitable, medium urgency)
- CVE-2017-12799 binutils (remotely exploitable, medium urgency)
- CVE-2017-12967 binutils (remotely exploitable, medium urgency)
- CVE-2017-13710 binutils (remotely exploitable, medium urgency)
- CVE-2017-13716 binutils (remotely exploitable, low urgency)
- CVE-2017-13757 binutils (remotely exploitable, medium urgency)
- CVE-2017-14128 binutils (remotely exploitable, low urgency)
- CVE-2017-14129 binutils (remotely exploitable, low urgency)
- CVE-2017-14130 binutils (remotely exploitable, low urgency)
- CVE-2017-14333 binutils (remotely exploitable, medium urgency)
- CVE-2017-14529 binutils (remotely exploitable, medium urgency)
- CVE-2017-14729 binutils (remotely exploitable, medium urgency)
- CVE-2017-14745 binutils (remotely exploitable, medium urgency)
- CVE-2017-14930 binutils (remotely exploitable, high urgency)
- CVE-2017-14932 binutils (remotely exploitable, medium urgency)
- CVE-2017-14933 binutils (remotely exploitable, medium urgency)
- CVE-2017-14934 binutils (remotely exploitable, medium urgency)
- CVE-2017-14938 binutils (remotely exploitable, medium urgency)
- CVE-2017-14939 binutils (remotely exploitable, medium urgency)
- CVE-2017-14940 binutils (remotely exploitable, medium urgency)
- CVE-2017-14974 binutils (remotely exploitable, medium urgency)
- CVE-2017-15020 binutils (remotely exploitable, medium urgency)
- CVE-2017-15021 binutils (remotely exploitable, medium urgency)
- CVE-2017-15022 binutils (remotely exploitable, medium urgency)
- CVE-2017-15023 binutils (remotely exploitable, medium urgency)
- CVE-2017-15024 binutils (remotely exploitable, medium urgency)
- CVE-2017-15025 binutils (remotely exploitable, medium urgency)
- CVE-2017-15225 binutils (remotely exploitable, medium urgency)
- CVE-2017-15938 binutils (remotely exploitable, medium urgency)
- CVE-2017-15996 binutils (remotely exploitable, medium urgency)
- CVE-2017-16826 binutils (remotely exploitable, medium urgency)
- CVE-2017-16827 binutils (remotely exploitable, medium urgency)
- CVE-2017-16828 binutils (remotely exploitable, medium urgency)
- CVE-2017-16829 binutils (remotely exploitable, medium urgency)
- CVE-2017-16830 binutils (remotely exploitable, medium urgency)
- CVE-2017-16831 binutils (remotely exploitable, medium urgency)
- CVE-2017-16832 binutils (remotely exploitable, medium urgency)
- CVE-2017-17080 binutils (remotely exploitable, medium urgency)
- CVE-2017-17121 binutils (remotely exploitable, medium urgency)
- CVE-2017-17122 binutils (remotely exploitable, medium urgency)
- CVE-2017-17123 binutils (remotely exploitable, medium urgency)
- CVE-2017-17124 binutils (remotely exploitable, medium urgency)
- CVE-2017-17125 binutils (remotely exploitable, medium urgency)
- CVE-2017-17126 binutils (remotely exploitable, medium urgency)
- CVE-2017-9038 binutils (remotely exploitable, low urgency)
- CVE-2017-9039 binutils (remotely exploitable, low urgency)
- CVE-2017-9040 binutils (remotely exploitable, low urgency)
- CVE-2017-9041 binutils (remotely exploitable, low urgency)
- CVE-2017-9042 binutils (remotely exploitable, low urgency)
- CVE-2017-9043 binutils (remotely exploitable, low urgency)
- CVE-2017-9044 binutils (remotely exploitable, low urgency)
- CVE-2017-9742 binutils (remotely exploitable, low urgency)
- CVE-2017-9743 binutils (remotely exploitable, low urgency)
- CVE-2017-9744 binutils (remotely exploitable, low urgency)
- CVE-2017-9745 binutils (remotely exploitable, low urgency)
- CVE-2017-9746 binutils (remotely exploitable, low urgency)
- CVE-2017-9747 binutils (remotely exploitable, low urgency)
- CVE-2017-9748 binutils (remotely exploitable, low urgency)
- CVE-2017-9749 binutils (remotely exploitable, low urgency)
- CVE-2017-9750 binutils (remotely exploitable, low urgency)
- CVE-2017-9751 binutils (remotely exploitable, low urgency)
- CVE-2017-9752 binutils (remotely exploitable, low urgency)
- CVE-2017-9753 binutils (remotely exploitable, low urgency)
- CVE-2017-9754 binutils (remotely exploitable, low urgency)
- CVE-2017-9755 binutils (remotely exploitable, low urgency)
- CVE-2017-9756 binutils (remotely exploitable, low urgency)
- CVE-2017-9954 binutils (remotely exploitable, medium urgency)
- CVE-2017-9955 binutils (remotely exploitable, medium urgency)
- CVE-2018-10372 binutils (remotely exploitable, medium urgency)
- CVE-2018-10373 binutils (remotely exploitable, medium urgency)
- CVE-2018-10534 binutils (remotely exploitable, medium urgency)
- CVE-2018-10535 binutils (remotely exploitable, medium urgency)
- CVE-2018-12641 binutils (low urgency)
- CVE-2018-12697 binutils (low urgency)
- CVE-2018-12698 binutils (low urgency)
- CVE-2018-12699 binutils (low urgency)
- CVE-2018-12700 binutils (low urgency)
- CVE-2018-12934 binutils (low urgency)
- CVE-2018-13033 binutils (low urgency)
- CVE-2018-6323 binutils (remotely exploitable, medium urgency)
- CVE-2018-6543 binutils (remotely exploitable, medium urgency)
- CVE-2018-6759 binutils (remotely exploitable, medium urgency)
- CVE-2018-6872 binutils (remotely exploitable, medium urgency)
- CVE-2018-7208 binutils (remotely exploitable, medium urgency)
- CVE-2018-7568 binutils (remotely exploitable, medium urgency)
- CVE-2018-7569 binutils (remotely exploitable, medium urgency)
- CVE-2018-7570 binutils (remotely exploitable, medium urgency)
- CVE-2018-7642 binutils (remotely exploitable, medium urgency)
- CVE-2018-7643 binutils (remotely exploitable, medium urgency)
- CVE-2018-8945 binutils (remotely exploitable, low urgency)
- CVE-2018-9138 binutils (remotely exploitable, low urgency)
- CVE-2018-9996 binutils (remotely exploitable, low urgency)
- CVE-2017-18198 libcdio-paranoia1 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio-paranoia1 (remotely exploitable, low urgency)
- CVE-2016-10228 libc-dev-bin (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc-dev-bin (high urgency)
- CVE-2017-1000409 libc-dev-bin (medium urgency)
- CVE-2017-12132 libc-dev-bin (remotely exploitable, medium urgency)
- CVE-2017-15670 libc-dev-bin (remotely exploitable, high urgency)
- CVE-2017-15671 libc-dev-bin (remotely exploitable, medium urgency)
- CVE-2017-15804 libc-dev-bin (remotely exploitable, low urgency)
- CVE-2017-16997 libc-dev-bin (remotely exploitable, high urgency)
- CVE-2017-18269 libc-dev-bin (remotely exploitable, high urgency)
- CVE-2018-1000001 libc-dev-bin (high urgency)
- CVE-2018-11236 libc-dev-bin (remotely exploitable, low urgency)
- CVE-2018-11237 libc-dev-bin (low urgency)
- CVE-2018-6485 libc-dev-bin (remotely exploitable, high urgency)
- CVE-2018-6551 libc-dev-bin (remotely exploitable, high urgency)
- CVE-2017-17446 libgme0 (remotely exploitable, medium urgency)
- CVE-2016-10040 qt5-gtk-platformtheme (remotely exploitable, medium urgency)
- CVE-2018-14048 libpng-dev
- CVE-2017-10268 mariadb-server (low urgency)
- CVE-2017-10378 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server (medium urgency)
- CVE-2017-3641 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server (low urgency)
- CVE-2018-2761 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server (remotely exploitable, medium urgency)
- CVE-2016-2779 libmount1 (high urgency)
- CVE-2017-7272 php7.0-common (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-common (remotely exploitable, high urgency)
- CVE-2017-14160 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-14044 libsoundtouch1 (low urgency)
- CVE-2018-14045 libsoundtouch1 (low urgency)
- CVE-2016-1516 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2016-1516 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-flann2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-flann2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2017-12424 login (remotely exploitable, high urgency)
- CVE-2018-7169 login (remotely exploitable, medium urgency)
- CVE-2018-9234 gnupg-agent (remotely exploitable, low urgency)
- CVE-2017-7272 php7.0-xml (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-xml (remotely exploitable, high urgency)
- CVE-2017-7697 libsamplerate0 (remotely exploitable, medium urgency)
- CVE-2016-1516 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-video2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-video2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2018-1000030 libpython2.7-minimal (remotely exploitable, medium urgency)
- CVE-2018-1060 libpython2.7-minimal (low urgency)
- CVE-2018-1061 libpython2.7-minimal (low urgency)
- CVE-2017-10268 mariadb-server-10.1 (low urgency)
- CVE-2017-10378 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server-10.1 (medium urgency)
- CVE-2017-3641 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server-10.1 (low urgency)
- CVE-2018-2761 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-7272 php7.0-intl (remotely exploitable, medium urgency)
- CVE-2017-8923 php7.0-intl (remotely exploitable, high urgency)
- CVE-2017-14160 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2018-1060 python3.5-dev (low urgency)
- CVE-2018-1061 python3.5-dev (low urgency)
- CVE-2002-2439 gcc-4.7-base (low urgency)
- CVE-2014-5044 gcc-4.7-base (remotely exploitable, high urgency)
- CVE-2017-11671 gcc-4.7-base (low urgency)
- CVE-2002-2439 gcc-4.6-base (low urgency)
- CVE-2014-5044 gcc-4.6-base (remotely exploitable, high urgency)
- CVE-2017-11671 gcc-4.6-base (low urgency)
- CVE-2016-9811 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2017-5837 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2017-5844 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2018-10754 ncurses-bin (remotely exploitable, low urgency)
- CVE-2018-9234 dirmngr (remotely exploitable, low urgency)
- CVE-2017-10683 libmpg123-0 (remotely exploitable, medium urgency)
- CVE-2017-12797 libmpg123-0 (remotely exploitable, medium urgency)
- CVE-2017-9545 libmpg123-0 (remotely exploitable, low urgency)
- CVE-2016-9797 bluez (remotely exploitable, medium urgency)
- CVE-2016-9798 bluez (remotely exploitable, medium urgency)
- CVE-2016-9799 bluez (remotely exploitable, medium urgency)
- CVE-2016-9800 bluez (remotely exploitable, medium urgency)
- CVE-2016-9801 bluez (remotely exploitable, medium urgency)
- CVE-2016-9802 bluez (remotely exploitable, medium urgency)
- CVE-2016-9803 bluez (remotely exploitable, medium urgency)
- CVE-2016-9804 bluez (remotely exploitable, medium urgency)
- CVE-2016-9917 bluez (remotely exploitable, medium urgency)
- CVE-2016-9918 bluez (remotely exploitable, medium urgency)
- CVE-2017-1000250 bluez (remotely exploitable, low urgency)
- CVE-2018-10910 bluez
- CVE-2016-10317 libgs9 (remotely exploitable, medium urgency)
- CVE-2018-10194 libgs9 (remotely exploitable, medium urgency)
- CVE-2018-11645 libgs9 (remotely exploitable, low urgency)
- CVE-2017-11399 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14055 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14056 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14057 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14058 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14169 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14171 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14222 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14223 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14225 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-17081 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavformat57 (low urgency)
- CVE-2018-12459 libavformat57 (low urgency)
- CVE-2018-13300 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-13302 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13305 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavformat57
- CVE-2018-14395 libavformat57
- CVE-2018-1999010 libavformat57
- CVE-2018-1999011 libavformat57
- CVE-2018-1999012 libavformat57
- CVE-2018-1999013 libavformat57
- CVE-2018-6392 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-7557 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavformat57 (remotely exploitable, low urgency)
- CVE-2016-10228 libc6-dev (remotely exploitable, medium urgency)
- CVE-2017-1000408 libc6-dev (high urgency)
- CVE-2017-1000409 libc6-dev (medium urgency)
- CVE-2017-12132 libc6-dev (remotely exploitable, medium urgency)
- CVE-2017-15670 libc6-dev (remotely exploitable, high urgency)
- CVE-2017-15671 libc6-dev (remotely exploitable, medium urgency)
- CVE-2017-15804 libc6-dev (remotely exploitable, low urgency)
- CVE-2017-16997 libc6-dev (remotely exploitable, high urgency)
- CVE-2017-18269 libc6-dev (remotely exploitable, high urgency)
- CVE-2018-1000001 libc6-dev (high urgency)
- CVE-2018-11236 libc6-dev (remotely exploitable, low urgency)
- CVE-2018-11237 libc6-dev (low urgency)
- CVE-2018-6485 libc6-dev (remotely exploitable, high urgency)
- CVE-2018-6551 libc6-dev (remotely exploitable, high urgency)
- CVE-2016-10517 redis-server (remotely exploitable, medium urgency)
- CVE-2017-9525 cron (medium urgency)
- CVE-2018-1000030 python2.7-dev (remotely exploitable, medium urgency)
- CVE-2018-1060 python2.7-dev (low urgency)
- CVE-2018-1061 python2.7-dev (low urgency)
- CVE-2016-6328 libexif12
- CVE-2017-7544 libexif12 (remotely exploitable, medium urgency)
- CVE-2017-16612 libwayland-cursor0 (remotely exploitable, medium urgency)
- CVE-2016-10228 locales (remotely exploitable, medium urgency)
- CVE-2017-1000408 locales (high urgency)
- CVE-2017-1000409 locales (medium urgency)
- CVE-2017-12132 locales (remotely exploitable, medium urgency)
- CVE-2017-15670 locales (remotely exploitable, high urgency)
- CVE-2017-15671 locales (remotely exploitable, medium urgency)
- CVE-2017-15804 locales (remotely exploitable, low urgency)
- CVE-2017-16997 locales (remotely exploitable, high urgency)
- CVE-2017-18269 locales (remotely exploitable, high urgency)
- CVE-2018-1000001 locales (high urgency)
- CVE-2018-11236 locales (remotely exploitable, low urgency)
- CVE-2018-11237 locales (low urgency)
- CVE-2018-6485 locales (remotely exploitable, high urgency)
- CVE-2018-6551 locales (remotely exploitable, high urgency)
- CVE-2016-1516 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5concurrent5 (remotely exploitable, medium urgency)
- CVE-2018-1000030 libpython2.7-stdlib (remotely exploitable, medium urgency)
- CVE-2018-1060 libpython2.7-stdlib (low urgency)
- CVE-2018-1061 libpython2.7-stdlib (low urgency)
- CVE-2017-14062 libidn11 (remotely exploitable, high urgency)
- CVE-2018-10906 fuse
- CVE-2016-2568 libpolkit-gobject-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-gobject-1-0
- CVE-2016-2779 util-linux (high urgency)
- CVE-2017-12678 libtag1v5-vanilla (remotely exploitable, medium urgency)
- CVE-2018-11439 libtag1v5-vanilla (remotely exploitable, medium urgency)
- CVE-2017-11671 gcc-5-base (low urgency)
- CVE-2018-1000030 python2.7-minimal (remotely exploitable, medium urgency)
- CVE-2018-1060 python2.7-minimal (low urgency)
- CVE-2018-1061 python2.7-minimal (low urgency)
- CVE-2018-1060 libpython3.5-minimal (low urgency)
- CVE-2018-1061 libpython3.5-minimal (low urgency)
- CVE-2017-15400 libcups2 (remotely exploitable, high urgency)
- CVE-2017-18190 libcups2 (remotely exploitable, medium urgency)
- CVE-2017-18248 libcups2 (remotely exploitable, low urgency)
- CVE-2018-4180 libcups2
- CVE-2018-4181 libcups2
- CVE-2018-6553 libcups2
- CVE-2016-2779 libsmartcols1 (high urgency)
- CVE-2017-12618 libaprutil1-ldap (low urgency)
- CVE-2017-16612 libwayland-server0 (remotely exploitable, medium urgency)
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-webui ]
- Site ncp already enabled
- ncp-web enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.199
- ExternalIPAddress = 0.0.0.0
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ unattended-upgrades ]
- Unattended upgrades active: yes (autoreboot yes)
- [ nc-autoupdate-ncp ]
- automatic NextCloudPi updates enabled
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- UPNP_DeletePortMapping() returned : 606
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:443
- external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:5000/rootDesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
- Trying to continue anyway
- Local LAN ip address : 192.168.0.2
- ExternalIPAddress = 0.0.0.0
- AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
- InternalIP:Port = 192.168.0.199:80
- external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
- GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
- GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
- GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- InternalIP:Port = 192.168.0.5:443
- external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 0
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- InternalIP:Port = 192.168.0.5:443
- external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
- GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- InternalIP:Port = 192.168.0.5:443
- external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 403
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 403
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(443, 443, 192.168.0.5) failed with code 403 (UnknownError)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 403
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 403
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(443, 443, 192.168.0.5) failed with code 403 (UnknownError)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- [ fail2ban ]
- System config value loglevel set to string 2
- System config value log_type set to string file
- fail2ban enabled
- [ fail2ban ]
- fail2ban disabled
- [ UFW ]
- Backing up 'after6.rules' to '/etc/ufw/after6.rules.20180901_114833'
- Backing up 'after.rules' to '/etc/ufw/after.rules.20180901_114833'
- Backing up 'user.rules' to '/etc/ufw/user.rules.20180901_114833'
- Backing up 'user6.rules' to '/etc/ufw/user6.rules.20180901_114833'
- Backing up 'before.rules' to '/etc/ufw/before.rules.20180901_114833'
- Backing up 'before6.rules' to '/etc/ufw/before6.rules.20180901_114833'
- Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
- Executing: /lib/systemd/systemd-sysv-install disable ufw
- UFW disabled
- [ fail2ban ]
- System config value loglevel set to string 2
- System config value log_type set to string file
- fail2ban enabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 401
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/l2tpv3.xml
- st: upnp:rootdevice
- UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- GetExternalIPAddress failed.
- AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
- GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:service:WANIPConnection:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ nc-forward-ports ]
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- UPNP_DeletePortMapping() returned : 714
- upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
- Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
- for more information.
- List of UPNP devices found on the network :
- desc: http://192.168.0.1:49000/igddesc.xml
- st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
- Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
- Trying to continue anyway
- Local LAN ip address : 192.168.0.5
- ExternalIPAddress =
- AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
- GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
- Could not forward ports automatically.
- Do it manually, or activate UPnP in your router and try again
- [ no-ip ]
- [ spDYN ]
- [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
- [ spDYN ]
- [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
- [ spDYN ]
- [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
- [ spDYN ]
- ... removing cronfile: /etc/cron.d/spdnsupdater
- spdnsUpdater is now disabled
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- noip DDNS enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ UFW ]
- Firewall is active and enabled on system startup
- Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
- Executing: /lib/systemd/systemd-sysv-install enable ufw
- # web server rules
- Rule added
- Rule added (v6)
- Rule added
- Rule added (v6)
- Rule added
- Rule added (v6)
- # SSH rules
- Rule added
- Rule added (v6)
- # DNS rules
- Rule added
- Rule added (v6)
- # SAMBA rules
- Rule added
- Rule added (v6)
- # NFS rules
- Rule added
- Rule added (v6)
- # UPnP rules
- Rule added
- UFW enabled
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert not yet due for renewal
- Keeping the existing certificate
- -------------------------------------------------------------------------------
- Certificate not yet due for renewal; no action taken.
- -------------------------------------------------------------------------------
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-autoupdate-ncp ]
- automatic NextCloudPi updates enabled
- [ nc-backup-auto ]
- automatic backups enabled
- [ nc-notify-updates ]
- update web notifications enabled
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Malformed version
- [ncp-update-nc]
- Current Nextcloud version 13.0.6.1
- Available Nextcloud version 14.0.1
- Download Nextcloud 14.0.1...
- Back up current instance...
- check free space...
- Maintenance mode enabled
- backup database...
- backup base files...
- compressing backup file...
- backup /var/www//nextcloud-bkp_20181004_1538627157.tar.gz generated
- Nextcloud is in maintenance mode - no apps have been loaded
- Maintenance mode disabled
- Install Nextcloud 14.0.1...
- Restore apps...
- * admin_notifications
- * bookmarks
- * bruteforcesettings
- * calendar
- * contacts
- * end_to_end_encryption
- * gpxpod
- * news
- * notes
- * previewgenerator
- * ransomware_protection
- * tasks
- * twofactor_totp
- Fix permissions...
- Upgrade...
- Nextcloud or one of the apps require upgrade - only a limited number of commands are available
- You may use your browser or the occ upgrade command to do the upgrade
- Set log level to debug
- Turned on maintenance mode
- Updating database schema
- Updated database
- Disabled incompatible app: admin_notifications
- Disabled incompatible app: bookmarks
- Disabled incompatible app: gpxpod
- Disabled incompatible app: ransomware_protection
- Disabled incompatible app: twofactor_totp
- Updating <federatedfilesharing> ...
- Updated <federatedfilesharing> to 1.4.0
- Updating <files_texteditor> ...
- Updated <files_texteditor> to 2.6.0
- Updating <files_videoplayer> ...
- Updated <files_videoplayer> to 1.3.0
- Updating <gallery> ...
- Updated <gallery> to 18.1.0
- Updating <password_policy> ...
- Updated <password_policy> to 1.4.0
- Updating <provisioning_api> ...
- Updated <provisioning_api> to 1.4.0
- Updating <serverinfo> ...
- Updated <serverinfo> to 1.4.0
- Updating <twofactor_backupcodes> ...
- Updated <twofactor_backupcodes> to 1.3.1
- Updating <updatenotification> ...
- Updated <updatenotification> to 1.4.1
- Updating <lookup_server_connector> ...
- Updated <lookup_server_connector> to 1.2.0
- Updating <oauth2> ...
- Updated <oauth2> to 1.2.1
- Updating <files> ...
- Updated <files> to 1.9.0
- Updating <activity> ...
- Updated <activity> to 2.7.0
- Updating <dav> ...
- Fix broken values of calendar objects
- Starting ...
- 0/0 [>---------------------------] 0%
- Updated <dav> to 1.6.0
- Updating <files_sharing> ...
- Updated <files_sharing> to 1.6.2
- Updating <files_trashbin> ...
- Updated <files_trashbin> to 1.4.1
- Updating <files_versions> ...
- Updated <files_versions> to 1.7.1
- Updating <sharebymail> ...
- Updated <sharebymail> to 1.4.0
- Updating <workflowengine> ...
- Updated <workflowengine> to 1.4.0
- Updating <firstrunwizard> ...
- Updated <firstrunwizard> to 2.3.0
- Updating <nextcloud_announcements> ...
- Updated <nextcloud_announcements> to 1.3.0
- Updating <notifications> ...
- Updated <notifications> to 2.2.1
- Updating <theming> ...
- Updated <theming> to 1.5.0
- Checking for update of app activity in appstore
- Checked for update of app "activity" in appstore
- Checking for update of app bruteforcesettings in appstore
- Checked for update of app "bruteforcesettings" in appstore
- Checking for update of app calendar in appstore
- Update app calendar from appstore
- Checked for update of app "calendar" in appstore
- Checking for update of app cloud_federation_api in appstore
- Checked for update of app "cloud_federation_api" in appstore
- Checking for update of app contacts in appstore
- Update app contacts from appstore
- Checked for update of app "contacts" in appstore
- Checking for update of app dav in appstore
- Checked for update of app "dav" in appstore
- Checking for update of app federatedfilesharing in appstore
- Checked for update of app "federatedfilesharing" in appstore
- Checking for update of app files in appstore
- Checked for update of app "files" in appstore
- Checking for update of app files_sharing in appstore
- Checked for update of app "files_sharing" in appstore
- Checking for update of app files_texteditor in appstore
- Checked for update of app "files_texteditor" in appstore
- Checking for update of app files_trashbin in appstore
- Checked for update of app "files_trashbin" in appstore
- Checking for update of app files_versions in appstore
- Checked for update of app "files_versions" in appstore
- Checking for update of app files_videoplayer in appstore
- Checked for update of app "files_videoplayer" in appstore
- Checking for update of app firstrunwizard in appstore
- Checked for update of app "firstrunwizard" in appstore
- Checking for update of app gallery in appstore
- Checked for update of app "gallery" in appstore
- Checking for update of app logreader in appstore
- Checked for update of app "logreader" in appstore
- Checking for update of app lookup_server_connector in appstore
- Checked for update of app "lookup_server_connector" in appstore
- Checking for update of app nextcloud_announcements in appstore
- Checked for update of app "nextcloud_announcements" in appstore
- Checking for update of app notes in appstore
- Checked for update of app "notes" in appstore
- Checking for update of app notifications in appstore
- Checked for update of app "notifications" in appstore
- Checking for update of app oauth2 in appstore
- Checked for update of app "oauth2" in appstore
- Checking for update of app password_policy in appstore
- Checked for update of app "password_policy" in appstore
- Checking for update of app previewgenerator in appstore
- Checked for update of app "previewgenerator" in appstore
- Checking for update of app provisioning_api in appstore
- Checked for update of app "provisioning_api" in appstore
- Checking for update of app serverinfo in appstore
- Checked for update of app "serverinfo" in appstore
- Checking for update of app sharebymail in appstore
- Checked for update of app "sharebymail" in appstore
- Checking for update of app tasks in appstore
- Checked for update of app "tasks" in appstore
- Checking for update of app theming in appstore
- Checked for update of app "theming" in appstore
- Checking for update of app twofactor_backupcodes in appstore
- Checked for update of app "twofactor_backupcodes" in appstore
- Checking for update of app updatenotification in appstore
- Checked for update of app "updatenotification" in appstore
- Checking for update of app workflowengine in appstore
- Checked for update of app "workflowengine" in appstore
- Starting code integrity check...
- Finished code integrity check
- Update successful
- Turned off maintenance mode
- Reset log level
- Check indices of the share table.
- Adding additional mtime index to the filecache table, this can take some time...
- Filecache table updated successfully.
- - EXCEPTION:
- - class: OC\IntegrityCheck\Exceptions\InvalidSignatureException
- - message: Signature data not found.
- Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181004_1538627157-13.0.6.1.tar.gz
- Clean up...
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.1
- Nothing to update
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.1.1
- Available Nextcloud version 14.0.3
- Download Nextcloud 14.0.3...
- Back up current instance...
- Nextcloud is in maintenance mode - no apps have been loaded
- check free space...
- Maintenance mode already enabled
- backup database...
- backup base files...
- compressing backup file...
- backup /var/www//nextcloud-bkp_20181015_1539577555.tar.gz generated
- Maintenance mode disabled
- Install Nextcloud 14.0.3...
- Restore apps...
- * admin_notifications
- * bookmarks
- * bruteforcesettings
- * calendar
- * contacts
- * end_to_end_encryption
- * gpxpod
- * news
- * notes
- * previewgenerator
- * ransomware_protection
- * tasks
- * twofactor_totp
- Fix permissions...
- Upgrade...
- Nextcloud or one of the apps require upgrade - only a limited number of commands are available
- You may use your browser or the occ upgrade command to do the upgrade
- Set log level to debug
- Turned on maintenance mode
- Updating database schema
- Updated database
- Checking for update of app accessibility in appstore
- Checked for update of app "accessibility" in appstore
- Checking for update of app activity in appstore
- Checked for update of app "activity" in appstore
- Checking for update of app bookmarks in appstore
- Update app bookmarks from appstore
- Checked for update of app "bookmarks" in appstore
- Checking for update of app bruteforcesettings in appstore
- Checked for update of app "bruteforcesettings" in appstore
- Checking for update of app calendar in appstore
- Checked for update of app "calendar" in appstore
- Checking for update of app cloud_federation_api in appstore
- Checked for update of app "cloud_federation_api" in appstore
- Checking for update of app contacts in appstore
- Checked for update of app "contacts" in appstore
- Checking for update of app dav in appstore
- Checked for update of app "dav" in appstore
- Checking for update of app federatedfilesharing in appstore
- Checked for update of app "federatedfilesharing" in appstore
- Checking for update of app files in appstore
- Checked for update of app "files" in appstore
- Checking for update of app files_pdfviewer in appstore
- Checked for update of app "files_pdfviewer" in appstore
- Checking for update of app files_sharing in appstore
- Checked for update of app "files_sharing" in appstore
- Checking for update of app files_texteditor in appstore
- Checked for update of app "files_texteditor" in appstore
- Checking for update of app files_trashbin in appstore
- Checked for update of app "files_trashbin" in appstore
- Checking for update of app files_versions in appstore
- Checked for update of app "files_versions" in appstore
- Checking for update of app files_videoplayer in appstore
- Checked for update of app "files_videoplayer" in appstore
- Checking for update of app firstrunwizard in appstore
- Checked for update of app "firstrunwizard" in appstore
- Checking for update of app gallery in appstore
- Checked for update of app "gallery" in appstore
- Checking for update of app logreader in appstore
- Checked for update of app "logreader" in appstore
- Checking for update of app lookup_server_connector in appstore
- Checked for update of app "lookup_server_connector" in appstore
- Checking for update of app nextcloud_announcements in appstore
- Checked for update of app "nextcloud_announcements" in appstore
- Checking for update of app notes in appstore
- Checked for update of app "notes" in appstore
- Checking for update of app notifications in appstore
- Checked for update of app "notifications" in appstore
- Checking for update of app oauth2 in appstore
- Checked for update of app "oauth2" in appstore
- Checking for update of app password_policy in appstore
- Checked for update of app "password_policy" in appstore
- Checking for update of app previewgenerator in appstore
- Checked for update of app "previewgenerator" in appstore
- Checking for update of app provisioning_api in appstore
- Checked for update of app "provisioning_api" in appstore
- Checking for update of app serverinfo in appstore
- Checked for update of app "serverinfo" in appstore
- Checking for update of app sharebymail in appstore
- Checked for update of app "sharebymail" in appstore
- Checking for update of app support in appstore
- Checked for update of app "support" in appstore
- Checking for update of app tasks in appstore
- Checked for update of app "tasks" in appstore
- Checking for update of app theming in appstore
- Checked for update of app "theming" in appstore
- Checking for update of app twofactor_backupcodes in appstore
- Checked for update of app "twofactor_backupcodes" in appstore
- Checking for update of app updatenotification in appstore
- Checked for update of app "updatenotification" in appstore
- Checking for update of app workflowengine in appstore
- Checked for update of app "workflowengine" in appstore
- Starting code integrity check...
- Finished code integrity check
- Update successful
- Turned off maintenance mode
- Reset log level
- Check indices of the share table.
- Done.
- Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181015_1539577555-14.0.1.1.tar.gz
- Clean up...
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert is due for renewal, auto-renewing...
- Renewing an existing certificate
- Performing the following challenges:
- http-01 challenge for mynextcloudpi.ddns.net
- Using the webroot path /var/www/nextcloud for all unmatched domains.
- Waiting for verification...
- Cleaning up challenges
- Failed authorization procedure. mynextcloudpi.ddns.net (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://mynextcloudpi.ddns.net/.well-known/acme-challenge/82tVUwn4iTe7YFfYJJVdQ7FgSihPpngdeUBfF8VE_EY: Timeout during connect (likely firewall problem)
- IMPORTANT NOTES:
- - The following errors were reported by the server:
- Domain: mynextcloudpi.ddns.net
- Type: connection
- Detail: Fetching
- http://mynextcloudpi.ddns.net/.well-known/acme-challenge/82tVUwn4iTe7YFfYJJVdQ7FgSihPpngdeUBfF8VE_EY:
- Timeout during connect (likely firewall problem)
- To fix these errors, please make sure that your domain name was
- entered correctly and the DNS A record(s) for that domain
- contain(s) the right IP address. Additionally, please check that
- your computer has a publicly routable IP address and that no
- firewalls are preventing the server from communicating with the
- client. If you're using the webroot plugin, you should also verify
- that you are serving files from the webroot path you provided.
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert is due for renewal, auto-renewing...
- Renewing an existing certificate
- Performing the following challenges:
- http-01 challenge for mynextcloudpi.ddns.net
- Using the webroot path /var/www/nextcloud for all unmatched domains.
- Waiting for verification...
- Cleaning up challenges
- Generating key (2048 bits): /etc/letsencrypt/keys/0001_key-certbot.pem
- Creating CSR: /etc/letsencrypt/csr/0001_csr-certbot.pem
- IMPORTANT NOTES:
- - Congratulations! Your certificate and chain have been saved at
- /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
- cert will expire on 2019-01-16. To obtain a new or tweaked version
- of this certificate in the future, simply run certbot again. To
- non-interactively renew *all* of your certificates, run "certbot
- renew"
- - If you like Certbot, please consider supporting our work by:
- Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
- Donating to EFF: https://eff.org/donate-le
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- [ nc-audit ]
- General security audit
- [ Lynis 2.4.0 ]
- ################################################################################
- Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
- welcome to redistribute it under the terms of the GNU General Public License.
- See the LICENSE file for details about using this software.
- 2007-2016, CISOfy - https://cisofy.com/lynis/
- Enterprise support available (compliance, plugins, interface and tools)
- ################################################################################
- [+] Initializing program
- ------------------------------------
- [2C- Detecting OS... [41C [ DONE ]
- [2C- Checking profiles...[37C [ DONE ]
- ---------------------------------------------------
- Program version: 2.4.0
- Operating system: Linux
- Operating system name: Debian
- Operating system version: 9.4
- Kernel version: 4.14.50
- Hardware platform: armv7l
- Hostname: nextcloudpi
- ---------------------------------------------------
- Profiles: /etc/lynis/default.prf /etc/lynis/ncp.prf
- Log file: /var/log/lynis.log
- Report file: /var/log/lynis-report.dat
- Report version: 1.0
- Plugin directory: /etc/lynis/plugins
- ---------------------------------------------------
- Auditor: [Not Specified]
- Test category: all
- Test group: all
- ---------------------------------------------------
- [2C- Program update status... [32C [ WARNING ]
- ===============================================================================
- Lynis update available
- ===============================================================================
- Current version is more than 4 months old
- Current version : 240 Latest version : 266
- Please update to the latest version.
- New releases include additional features, bug fixes, tests and baselines.
- Download the latest version:
- Packages (DEB/RPM) - https://packages.cisofy.com
- Website - https://cisofy.com/downloads/
- GitHub - https://github.com/CISOfy/lynis
- ===============================================================================
- [+] System Tools
- ------------------------------------
- [2C- Scanning available tools...[30C
- [2C- Checking system binaries...[30C
- [+] Plugins (phase 1)
- ------------------------------------
- [0CNote: plugins have more extensive tests and may take several minutes to complete[0C
- [0C [0C
- [2C- Plugin: debian[43C
- [
- [+] Debian Tests
- ------------------------------------
- [2C- Checking for system binaries that are required by Debian Tests...[0C
- [4C- Checking /bin... [38C [ FOUND ]
- [4C- Checking /sbin... [37C [ FOUND ]
- [4C- Checking /usr/bin... [34C [ FOUND ]
- [4C- Checking /usr/sbin... [33C [ FOUND ]
- [4C- Checking /usr/local/bin... [28C [ FOUND ]
- [4C- Checking /usr/local/sbin... [27C [ FOUND ]
- [2C- Authentication:[42C
- [4C- PAM (Pluggable Authentication Modules):[16C
- [6C- libpam-tmpdir[40C [ Not Installed ]
- [6C- libpam-usb[43C [ Not Installed ]
- [2C- File System Checks:[38C
- [4C- DM-Crypt, Cryptsetup & Cryptmount:[21C
- [2C- Software:[48C
- [4C- apt-listchanges[40C [ Installed and enabled for apt ]
- [4C- checkrestart[43C [ Installed ]
- [4C- needrestart[44C [ Not Installed ]
- [4C- debsecan[47C [ Installed and enabled for cron ]
- [4C- debsums[48C [ Installed and enabled for cron ]
- [4C- fail2ban[47C [ Installed with jail.local ]
- ]
- [+] Boot and services
- ------------------------------------
- [2C- Service Manager[42C [ systemd ]
- [2C- Checking UEFI boot[39C [ DISABLED ]
- [4C- Boot loader[44C [ NONE FOUND ]
- [2C- Check running services (systemctl)[23C [ DONE ]
- [8CResult: found 30 running services[20C
- [2C- Check enabled services at boot (systemctl)[15C [ DONE ]
- [8CResult: found 45 enabled services[20C
- [2C- Check startup files (permissions)[24C [ OK ]
- [+] Kernel
- ------------------------------------
- [2C- Checking default runlevel[32C [ runlevel 5 ]
- [2C- Checking kernel version and release[22C [ DONE ]
- [2C- Checking kernel type[37C [ DONE ]
- [2C- Checking loaded kernel modules[27C [ DONE ]
- [6CFound 65 active modules[32C
- [2C- Checking Linux kernel configuration file[17C [ NOT FOUND ]
- [2C- Checking core dumps configuration[24C [ DISABLED ]
- [4C- Checking setuid core dumps configuration[15C [ DEFAULT ]
- [2C- Check if reboot is needed[32C [ UNKNOWN ]
- [+] Memory and Processes
- ------------------------------------
- [2C- Checking /proc/meminfo[35C [ FOUND ]
- [2C- Searching for dead/zombie processes[22C [ OK ]
- [2C- Searching for IO waiting processes[23C [ OK ]
- [+] Users, Groups and Authentication
- ------------------------------------
- [2C- Administrator accounts[35C [ OK ]
- [2C- Unique UIDs[46C [ OK ]
- [2C- Consistency of group files (grpck)[23C [ OK ]
- [2C- Unique group IDs[41C [ OK ]
- [2C- Unique group names[39C [ OK ]
- [2C- Password file consistency[32C [ OK ]
- [2C- Query system users (non daemons)[25C [ DONE ]
- [2C- NIS+ authentication support[30C [ NOT ENABLED ]
- [2C- NIS authentication support[31C [ NOT ENABLED ]
- [2C- sudoers file[45C [ FOUND ]
- [4C- Check sudoers file permissions[25C [ OK ]
- [2C- PAM password strength tools[30C [ SUGGESTION ]
- [2C- PAM configuration files (pam.conf)[23C [ FOUND ]
- [2C- PAM configuration files (pam.d)[26C [ FOUND ]
- [2C- PAM modules[46C [ NOT FOUND ]
- [2C- LDAP module in PAM[39C [ NOT FOUND ]
- [2C- Accounts without expire date[29C [ OK ]
- [2C- Accounts without password[32C [ OK ]
- [2C- Checking user password aging (minimum)[19C [ DISABLED ]
- [2C- User password aging (maximum)[28C [ DISABLED ]
- [2C- Checking expired passwords[31C [ OK ]
- [2C- Checking Linux single user mode authentication[11C [ OK ]
- [2C- Determining default umask[32C
- [4C- umask (/etc/profile)[35C [ NOT FOUND ]
- [4C- umask (/etc/login.defs)[32C [ SUGGESTION ]
- [2C- LDAP authentication support[30C [ NOT ENABLED ]
- [2C- Logging failed login attempts[28C [ ENABLED ]
- [+] Shells
- ------------------------------------
- [2C- Checking shells from /etc/shells[25C
- [4CResult: found 4 shells (valid shells: 4).[16C
- [4C- Session timeout settings/tools[25C [ NONE ]
- [2C- Checking default umask values[28C
- [4C- Checking default umask in /etc/bash.bashrc[13C [ NONE ]
- [4C- Checking default umask in /etc/profile[17C [ NONE ]
- [+] File systems
- ------------------------------------
- [2C- Query swap partitions (fstab)[28C [ NONE ]
- [2C- Testing swap partitions[34C [ OK ]
- [2C- Testing /proc mount (hidepid)[28C [ SUGGESTION ]
- [2C- Checking for old files in /tmp[27C [ OK ]
- [2C- Checking /tmp sticky bit[33C [ OK ]
- [2C- ACL support root file system[29C [ ENABLED ]
- [2C- Mount options of /[39C [ NON DEFAULT ]
- [2C- Mount options of /boot[35C [ NON DEFAULT ]
- [2C- Disable kernel support of some filesystems[15C
- [4C- Discovered kernel modules: hfs hfsplus jffs2 squashfs udf [0C
- [+] Storage
- ------------------------------------
- [2C- Checking USB devices authorization[23C [ ENABLED ]
- [+] NFS
- ------------------------------------
- [2C- Query rpc registered programs[28C [ DONE ]
- [2C- Query NFS versions[39C [ DONE ]
- [2C- Query NFS protocols[38C [ DONE ]
- [2C- Check running NFS daemon[33C [ NOT FOUND ]
- [+] Name services
- ------------------------------------
- [2C- Checking /etc/hosts[38C
- [4C- Checking /etc/hosts (duplicates)[23C [ OK ]
- [4C- Checking /etc/hosts (hostname)[25C [ OK ]
- [4C- Checking /etc/hosts (localhost)[24C [ OK ]
- [+] Ports and packages
- ------------------------------------
- [2C- Searching package managers[31C
- [4C- Searching dpkg package manager[25C [ FOUND ]
- [6C- Querying package manager[29C
- [4C- Query unpurged packages[32C [ FOUND ]
- [4C- debsecan utility[39C [ FOUND ]
- [6C- debsecan cron job[36C [ FOUND ]
- [4C- debsums utility[40C [ FOUND ]
- [6C- Cron job for debsums[33C [ FOUND ]
- [2C- Checking vulnerable packages (apt-get only)[14C [ DONE ]
- [2C- Checking package audit tool[30C [ INSTALLED ]
- [4CFound: apt-get[43C
- [+] Networking
- ------------------------------------
- [2C- Checking IPv6 configuration[30C [ ENABLED ]
- [6CConfiguration method[35C [ AUTO ]
- [6CIPv6 only[46C [ NO ]
- [2C- Checking configured nameservers[26C
- [4C- Testing nameservers[36C
- [8CNameserver: 127.0.0.1[32C [ OK ]
- [2C- Checking default gateway[33C [ DONE ]
- [2C- Getting listening ports (TCP/UDP)[24C [ DONE ]
- [6C* Found 18 ports[39C
- [2C- Checking promiscuous interfaces[26C [ OK ]
- [2C- Checking waiting connections[29C [ OK ]
- [2C- Checking status DHCP client[30C [ NOT ACTIVE ]
- [2C- Checking for ARP monitoring software[21C [ NOT FOUND ]
- [+] Printers and Spools
- ------------------------------------
- [2C- Checking cups daemon[37C [ NOT FOUND ]
- [2C- Checking lp daemon[39C [ NOT RUNNING ]
- [+] Software: e-mail and messaging
- ------------------------------------
- [2C- Checking Exim status[37C [ NOT FOUND ]
- [2C- Checking Postfix status[34C [ RUNNING ]
- [2C- Checking Postfix configuration[27C [ FOUND ]
- [4C- Postfix banner[41C [ WARNING ]
- [2C- Checking Dovecot status[34C [ NOT FOUND ]
- [2C- Checking Qmail status[36C [ NOT FOUND ]
- [2C- Checking Sendmail status[33C [ NOT FOUND ]
- [+] Software: firewalls
- ------------------------------------
- [2C- Checking iptables kernel module[26C [ FOUND ]
- [4C- Checking iptables policies of chains[19C [ FOUND ]
- [4C- Checking for empty ruleset[29C [ OK ]
- [2C- Checking host based firewall[29C [ ACTIVE ]
- [+] Software: webserver
- ------------------------------------
- [2C- Checking Apache (binary /usr/sbin/apache2)[15C [ FOUND ]
- [6CInfo: Found 3 virtual hosts[28C
- [4C* Loadable modules[39C [ FOUND ]
- [8C- Found 116 loadable modules[25C
- [10CModSecurity: web application firewall[14C [ FOUND ]
- [2C- Checking nginx[43C [ NOT FOUND ]
- [+] SSH Support
- ------------------------------------
- [2C- Checking running SSH daemon[30C [ FOUND ]
- [4C- Searching SSH configuration[28C [ FOUND ]
- [4C- SSH option: AllowTcpForwarding[25C [ SUGGESTION ]
- [4C- SSH option: ClientAliveCountMax[24C [ SUGGESTION ]
- [4C- SSH option: ClientAliveInterval[24C [ OK ]
- [4C- SSH option: Compression[32C [ SUGGESTION ]
- [4C- SSH option: FingerprintHash[28C [ OK ]
- [4C- SSH option: GatewayPorts[31C [ OK ]
- [4C- SSH option: IgnoreRhosts[31C [ OK ]
- [4C- SSH option: LoginGraceTime[29C [ OK ]
- [4C- SSH option: LogLevel[35C [ SUGGESTION ]
- [4C- SSH option: MaxAuthTries[31C [ SUGGESTION ]
- [4C- SSH option: MaxSessions[32C [ SUGGESTION ]
- [4C- SSH option: PermitRootLogin[28C [ SUGGESTION ]
- [4C- SSH option: PermitUserEnvironment[22C [ OK ]
- [4C- SSH option: PermitTunnel[31C [ OK ]
- [4C- SSH option: Port[39C [ SUGGESTION ]
- [4C- SSH option: PrintLastLog[31C [ OK ]
- [4C- SSH option: Protocol[35C [ NOT FOUND ]
- [4C- SSH option: StrictModes[32C [ OK ]
- [4C- SSH option: TCPKeepAlive[31C [ SUGGESTION ]
- [4C- SSH option: UseDNS[37C [ OK ]
- [4C- SSH option: UsePrivilegeSeparation[21C [ OK ]
- [4C- SSH option: VerifyReverseMapping[23C [ NOT FOUND ]
- [4C- SSH option: X11Forwarding[30C [ SUGGESTION ]
- [4C- SSH option: AllowAgentForwarding[23C [ SUGGESTION ]
- [4C- SSH option: AllowUsers[33C [ NOT FOUND ]
- [4C- SSH option: AllowGroups[32C [ NOT FOUND ]
- [+] SNMP Support
- ------------------------------------
- [2C- Checking running SNMP daemon[29C [ NOT FOUND ]
- [+] Databases
- ------------------------------------
- [2C- MySQL process status[37C [ FOUND ]
- [2C- Redis (server) status[36C [ FOUND ]
- [4C- Redis (requirepass configured)[25C [ FOUND ]
- [4C- Redis (rename of CONFIG command)[23C [ FOUND ]
- [4C- Redis (bind on localhost)[30C [ FOUND ]
- [+] LDAP Services
- ------------------------------------
- [2C- Checking OpenLDAP instance[31C [ NOT FOUND ]
- [+] PHP
- ------------------------------------
- [2C- Checking PHP[45C [ NOT FOUND ]
- [+] Squid Support
- ------------------------------------
- [2C- Checking running Squid daemon[28C [ NOT FOUND ]
- [+] Logging and files
- ------------------------------------
- [2C- Checking for a running log daemon[24C [ OK ]
- [4C- Checking Syslog-NG status[30C [ NOT FOUND ]
- [4C- Checking systemd journal status[24C [ FOUND ]
- [4C- Checking Metalog status[32C [ NOT FOUND ]
- [4C- Checking RSyslog status[32C [ FOUND ]
- [4C- Checking RFC 3195 daemon status[24C [ NOT FOUND ]
- [4C- Checking minilogd instances[28C [ NOT FOUND ]
- [2C- Checking logrotate presence[30C [ OK ]
- [2C- Checking log directories (static list)[19C [ DONE ]
- [2C- Checking open log files[34C [ DONE ]
- [2C- Checking deleted files in use[28C [ FILES FOUND ]
- [+] Insecure services
- ------------------------------------
- [2C- Checking inetd status[36C [ NOT ACTIVE ]
- [+] Banners and identification
- ------------------------------------
- [2C- /etc/issue[47C [ FOUND ]
- [4C- /etc/issue contents[36C [ WEAK ]
- [2C- /etc/issue.net[43C [ FOUND ]
- [4C- /etc/issue.net contents[32C [ WEAK ]
- [+] Scheduled tasks
- ------------------------------------
- [2C- Checking crontab/cronjob[33C [ DONE ]
- [+] Accounting
- ------------------------------------
- [2C- Checking accounting information[26C [ NOT FOUND ]
- [2C- Checking sysstat accounting data[25C [ NOT FOUND ]
- [+] Time and Synchronization
- ------------------------------------
- [2C- NTP daemon found: systemd (timesyncd)[20C [ FOUND ]
- [2C- Checking for a running NTP daemon or client[14C [ OK ]
- [+] Cryptography
- ------------------------------------
- [2C- Checking for expired SSL certificates[20C [ NONE ]
- [+] Virtualization
- ------------------------------------
- [+] Containers
- ------------------------------------
- [+] Security frameworks
- ------------------------------------
- [2C- Checking presence AppArmor[31C [ NOT FOUND ]
- [2C- Checking presence SELinux[32C [ NOT FOUND ]
- [2C- Checking presence grsecurity[29C [ NOT FOUND ]
- [2C- Checking for implemented MAC framework[19C [ NONE ]
- [+] Software: file integrity
- ------------------------------------
- [2C- Checking file integrity tools[28C
- [2C- Checking presence integrity tool[25C [ NOT FOUND ]
- [+] Software: System tooling
- ------------------------------------
- [2C- Checking presence of Fail2ban[28C [ FOUND ]
- WARNING 'backend' not defined in 'ssh'. Using default one: 'auto'
- WARNING 'backend' not defined in 'nextcloud'. Using default one: 'auto'
- [4C- Checking Fail2ban jails[32C [ ENABLED ]
- [2C- Checking for IDS/IPS tooling[29C [ FOUND ]
- [+] Software: Malware
- ------------------------------------
- [+] File Permissions
- ------------------------------------
- [2C- Starting file permissions check[26C
- [4C/etc/lilo.conf[43C [ NOT FOUND ]
- [4C/root/.ssh[47C [ OK ]
- [4C/etc/lilo.conf[43C [ NOT FOUND ]
- [4C/root/.ssh[47C [ OK ]
- [+] Home directories
- ------------------------------------
- [2C- Checking shell history files[29C [ OK ]
- [+] Kernel Hardening
- ------------------------------------
- [2C- Comparing sysctl key pairs with scan profile[13C
- [4C- kernel.core_uses_pid (exp: 1)[26C [ DIFFERENT ]
- [4C- kernel.ctrl-alt-del (exp: 0)[27C [ OK ]
- [4C- kernel.kptr_restrict (exp: 2)[26C [ DIFFERENT ]
- [4C- kernel.randomize_va_space (exp: 2)[21C [ OK ]
- [4C- kernel.sysrq (exp: 0)[34C [ DIFFERENT ]
- [4C- net.ipv4.conf.all.accept_redirects (exp: 0)[12C [ OK ]
- [4C- net.ipv4.conf.all.accept_source_route (exp: 0)[9C [ OK ]
- [4C- net.ipv4.conf.all.bootp_relay (exp: 0)[17C [ OK ]
- [4C- net.ipv4.conf.all.forwarding (exp: 0)[18C [ OK ]
- [4C- net.ipv4.conf.all.log_martians (exp: 1)[16C [ DIFFERENT ]
- [4C- net.ipv4.conf.all.mc_forwarding (exp: 0)[15C [ OK ]
- [4C- net.ipv4.conf.all.proxy_arp (exp: 0)[19C [ OK ]
- [4C- net.ipv4.conf.all.rp_filter (exp: 1)[19C [ OK ]
- [4C- net.ipv4.conf.all.send_redirects (exp: 0)[14C [ DIFFERENT ]
- [4C- net.ipv4.conf.default.accept_redirects (exp: 0)[8C [ OK ]
- [4C- net.ipv4.conf.default.accept_source_route (exp: 0)[5C [ OK ]
- [4C- net.ipv4.conf.default.log_martians (exp: 1)[12C [ DIFFERENT ]
- [4C- net.ipv4.icmp_echo_ignore_broadcasts (exp: 1)[10C [ OK ]
- [4C- net.ipv4.icmp_ignore_bogus_error_responses (exp: 1)[4C [ OK ]
- [4C- net.ipv4.tcp_syncookies (exp: 1)[23C [ OK ]
- [4C- net.ipv4.tcp_timestamps (exp: 0)[23C [ DIFFERENT ]
- [4C- net.ipv6.conf.all.accept_redirects (exp: 0)[12C [ OK ]
- [4C- net.ipv6.conf.all.accept_source_route (exp: 0)[9C [ OK ]
- [4C- net.ipv6.conf.default.accept_redirects (exp: 0)[8C [ OK ]
- [4C- net.ipv6.conf.default.accept_source_route (exp: 0)[5C [ OK ]
- [+] Hardening
- ------------------------------------
- [4C- Installed compiler(s)[34C [ FOUND ]
- [4C- Installed malware scanner[30C [ NOT FOUND ]
- [4C- Installed malware scanner[30C [ NOT FOUND ]
- [+] Custom Tests
- ------------------------------------
- [2C- Running custom tests... [33C [ NONE ]
- [+] Plugins (phase 2)
- ------------------------------------
- ================================================================================
- -[ Lynis 2.4.0 Results ]-
- Warnings (2):
- ----------------------------
- ! Version of Lynis is very old and should be updated [LYNIS]
- https://cisofy.com/controls/LYNIS/
- ! Found mail_name in SMTP banner, and/or mail_name contains 'Postfix' [MAIL-8818]
- https://cisofy.com/controls/MAIL-8818/
- Suggestions (30):
- ----------------------------
- * Install libpam-tmpdir to set $TMP and $TMPDIR for PAM sessions [CUST-0280]
- https://your-domain.example.org/controls/CUST-0280/
- * Install libpam-usb to enable multi-factor authentication for PAM sessions [CUST-0285]
- https://your-domain.example.org/controls/CUST-0285/
- * Install needrestart, alternatively to debian-goodies, so that you can run needrestart after upgrades to determine which daemons are using old versions of libraries and need restarting. [CUST-0831]
- https://your-domain.example.org/controls/CUST-0831/
- * Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [AUTH-9262]
- https://cisofy.com/controls/AUTH-9262/
- * Configure minimum password age in /etc/login.defs [AUTH-9286]
- https://cisofy.com/controls/AUTH-9286/
- * Configure maximum password age in /etc/login.defs [AUTH-9286]
- https://cisofy.com/controls/AUTH-9286/
- * Default umask in /etc/login.defs could be more strict like 027 [AUTH-9328]
- https://cisofy.com/controls/AUTH-9328/
- * Purge old/removed packages (16 found) with aptitude purge or dpkg --purge command. This will cleanup old configuration files, cron jobs and startup scripts. [PKGS-7346]
- https://cisofy.com/controls/PKGS-7346/
- * Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]
- https://cisofy.com/controls/NETW-3032/
- * You are advised to hide the mail_name (option: smtpd_banner) from your postfix configuration. Use postconf -e or change your main.cf file (/etc/postfix/main.cf) [MAIL-8818]
- https://cisofy.com/controls/MAIL-8818/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : AllowTcpForwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : ClientAliveCountMax (3 --> 2)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : Compression (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : LogLevel (INFO --> VERBOSE)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : MaxAuthTries (6 --> 1)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : MaxSessions (10 --> 2)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : PermitRootLogin (WITHOUT-PASSWORD --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : Port (22 --> )
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : TCPKeepAlive (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : X11Forwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Consider hardening SSH configuration [SSH-7408]
- - Details : AllowAgentForwarding (YES --> NO)
- https://cisofy.com/controls/SSH-7408/
- * Check what deleted files are still in use and why. [LOGG-2190]
- https://cisofy.com/controls/LOGG-2190/
- * Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
- https://cisofy.com/controls/BANN-7126/
- * Add legal banner to /etc/issue.net, to warn unauthorized users [BANN-7130]
- https://cisofy.com/controls/BANN-7130/
- * Enable process accounting [ACCT-9622]
- https://cisofy.com/controls/ACCT-9622/
- * Enable sysstat to collect accounting (no results) [ACCT-9626]
- https://cisofy.com/controls/ACCT-9626/
- * Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
- https://cisofy.com/controls/FINT-4350/
- * One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
- https://cisofy.com/controls/KRNL-6000/
- * Harden compilers like restricting access to root user only [HRDN-7222]
- https://cisofy.com/controls/HRDN-7222/
- * Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
- - Solution : Install a tool like rkhunter, chkrootkit, OSSEC
- https://cisofy.com/controls/HRDN-7230/
- Follow-up:
- ----------------------------
- - Show details of a test (lynis show details TEST-ID)
- - Check the logfile for all details (less /var/log/lynis.log)
- - Read security controls texts (https://cisofy.com)
- - Use --upload to upload data to central system (Lynis Enterprise users)
- ================================================================================
- Lynis security scan details:
- Hardening index : 65 [############# ]
- Tests performed : 205
- Plugins enabled : 1
- Components:
- - Firewall [V]
- - Malware scanner [X]
- Lynis Modules:
- - Compliance Status [?]
- - Security Audit [V]
- - Vulnerability Scan [V]
- Files:
- - Test and debug information : /var/log/lynis.log
- - Report data : /var/log/lynis-report.dat
- ================================================================================
- Notice: Lynis update available
- Current version : 240 Latest version : 266
- ================================================================================
- Lynis 2.4.0
- Auditing, system hardening, and compliance for UNIX-based systems
- (Linux, macOS, BSD, and others)
- 2007-2016, CISOfy - https://cisofy.com/lynis/
- Enterprise support available (compliance, plugins, interface and tools)
- ================================================================================
- [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
- Known vulnerabilities in this system
- CVE-2017-14160 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbisfile3 (remotely exploitable, medium urgency)
- CVE-2018-11645 libgs9-common (remotely exploitable, medium urgency)
- CVE-2018-17961 libgs9-common
- CVE-2018-18073 libgs9-common
- CVE-2018-18284 libgs9-common
- CVE-2018-5740 bind9-host
- CVE-2017-17087 vim-tiny (low urgency)
- CVE-2018-10754 libncurses5 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5core5a (remotely exploitable, medium urgency)
- CVE-2017-10268 mariadb-common (low urgency)
- CVE-2017-10378 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-common (medium urgency)
- CVE-2017-3641 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-common (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-common (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-common (low urgency)
- CVE-2018-2761 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-common (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-common (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-common (remotely exploitable, medium urgency)
- CVE-2017-12613 libapr1 (low urgency)
- CVE-2017-9118 php7.2-mysql (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-mysql (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-mysql
- CVE-2017-1000445 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-1000476 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-11531 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11532 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11534 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11539 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11644 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11724 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11751 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-11752 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12140 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12418 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12427 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12429 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12430 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12433 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12435 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12563 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12564 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12565 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12566 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12641 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12642 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12643 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12654 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12664 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12665 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12668 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12670 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12674 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12675 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12676 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-12691 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12692 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12693 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-12875 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-13061 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13133 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-13146 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13658 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-13768 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14060 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14172 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14173 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14174 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14175 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14249 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14341 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14400 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14505 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14528 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14532 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-14624 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14625 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14626 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-14739 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-14741 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-15015 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-15016 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-15017 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-15217 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-15281 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-17681 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-17682 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-17914 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-18209 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18211 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18252 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2017-18271 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2017-18273 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2018-10177 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-10804 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-10805 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-14551 imagemagick-6-common (remotely exploitable, high urgency)
- CVE-2018-15607 imagemagick-6-common (low urgency)
- CVE-2018-16323 imagemagick-6-common
- CVE-2018-16643 imagemagick-6-common (low urgency)
- CVE-2018-16749 imagemagick-6-common (low urgency)
- CVE-2018-18024 imagemagick-6-common (low urgency)
- CVE-2018-18025 imagemagick-6-common
- CVE-2018-7443 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2018-8804 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2018-8960 imagemagick-6-common (remotely exploitable, low urgency)
- CVE-2018-9133 imagemagick-6-common (remotely exploitable, medium urgency)
- CVE-2017-9118 php7.2-gd (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-gd (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-gd
- CVE-2018-10754 ncurses-term (remotely exploitable, low urgency)
- CVE-2018-4117 chromium-browser (remotely exploitable, medium urgency)
- CVE-2017-7475 libcairo2 (remotely exploitable, low urgency)
- CVE-2017-9814 libcairo2 (remotely exploitable, low urgency)
- CVE-2018-18064 libcairo2
- CVE-2018-10754 libtinfo5 (remotely exploitable, low urgency)
- CVE-2017-13135 libx265-95 (remotely exploitable, medium urgency)
- CVE-2018-1049 libudev1 (remotely exploitable, medium urgency)
- CVE-2018-6954 libudev1 (high urgency)
- CVE-2017-9118 php7.2-xml (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-xml (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-xml
- CVE-2018-0499 libxapian30 (remotely exploitable, medium urgency)
- CVE-2016-9811 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-5837 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-5844 gstreamer0.10-alsa (remotely exploitable, medium urgency)
- CVE-2017-11462 libk5crypto3 (remotely exploitable, low urgency)
- CVE-2018-5710 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2018-5729 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2018-5730 libk5crypto3 (remotely exploitable, medium urgency)
- CVE-2017-9118 php7.2-fpm (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-fpm (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-fpm
- CVE-2018-5740 libdns162
- CVE-2016-10040 libqt5dbus5 (remotely exploitable, medium urgency)
- CVE-2017-10268 mariadb-client-10.1 (low urgency)
- CVE-2017-10378 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-client-10.1 (medium urgency)
- CVE-2017-3641 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-client-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-client-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-client-10.1 (low urgency)
- CVE-2018-2761 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-client-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-client-10.1 (remotely exploitable, medium urgency)
- CVE-2017-10971 xserver-common (remotely exploitable, medium urgency)
- CVE-2017-10972 xserver-common (remotely exploitable, medium urgency)
- CVE-2017-12176 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12177 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12178 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12179 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12180 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12181 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12182 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12183 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12184 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12185 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12186 xserver-common (remotely exploitable, high urgency)
- CVE-2017-12187 xserver-common (remotely exploitable, high urgency)
- CVE-2017-13721 xserver-common (low urgency)
- CVE-2017-13723 xserver-common (medium urgency)
- CVE-2017-9118 php7.2-zip (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-zip (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-zip
- CVE-2017-11671 gcc-4.8-base (low urgency)
- CVE-2018-1000656 python3-flask
- CVE-2016-10517 redis-tools (remotely exploitable, medium urgency)
- CVE-2018-6594 python-crypto (remotely exploitable, medium urgency)
- CVE-2016-9112 libopenjp2-7 (remotely exploitable, medium urgency)
- CVE-2017-17480 libopenjp2-7 (remotely exploitable, high urgency)
- CVE-2018-14423 libopenjp2-7 (remotely exploitable, low urgency)
- CVE-2018-18088 libopenjp2-7 (low urgency)
- CVE-2018-5727 libopenjp2-7 (remotely exploitable, low urgency)
- CVE-2018-5785 libopenjp2-7 (remotely exploitable, low urgency)
- CVE-2018-6616 libopenjp2-7 (remotely exploitable, medium urgency)
- CVE-2016-10228 libc6-dbg (remotely exploitable, medium urgency)
- CVE-2017-12678 libtag1v5 (remotely exploitable, medium urgency)
- CVE-2018-11439 libtag1v5 (remotely exploitable, medium urgency)
- CVE-2018-1049 libpam-systemd (remotely exploitable, medium urgency)
- CVE-2018-6954 libpam-systemd (high urgency)
- CVE-2016-10040 libqt5widgets5 (remotely exploitable, medium urgency)
- CVE-2017-18198 libcdio13 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio13 (remotely exploitable, low urgency)
- CVE-2018-5740 libisc160
- CVE-2017-9118 php7.2-common (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-common (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-common
- CVE-2016-10040 libqt5network5 (remotely exploitable, medium urgency)
- CVE-2017-1000445 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-15607 libmagickcore-6.q16-3 (low urgency)
- CVE-2018-16323 libmagickcore-6.q16-3
- CVE-2018-16643 libmagickcore-6.q16-3 (low urgency)
- CVE-2018-16749 libmagickcore-6.q16-3 (low urgency)
- CVE-2018-18024 libmagickcore-6.q16-3 (low urgency)
- CVE-2018-18025 libmagickcore-6.q16-3
- CVE-2018-7443 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15232 libjpeg62-turbo (remotely exploitable, low urgency)
- CVE-2018-1152 libjpeg62-turbo (remotely exploitable, low urgency)
- CVE-2017-10268 mariadb-server-core-10.1 (low urgency)
- CVE-2017-10378 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server-core-10.1 (medium urgency)
- CVE-2017-3641 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server-core-10.1 (low urgency)
- CVE-2018-2761 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-1333 apache2 (remotely exploitable, medium urgency)
- CVE-2016-1516 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-5740 libisc-export160
- CVE-2017-11464 librsvg2-2 (remotely exploitable, medium urgency)
- CVE-2018-1000168 libnghttp2-14 (remotely exploitable, low urgency)
- CVE-2017-11399 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14055 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14056 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14057 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14058 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14169 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14171 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14222 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14223 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-14225 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavresample3 (remotely exploitable, high urgency)
- CVE-2017-17081 libavresample3 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-12459 libavresample3 (remotely exploitable, low urgency)
- CVE-2018-13300 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavresample3 (remotely exploitable, low urgency)
- CVE-2018-13302 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-14395 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-15822 libavresample3 (low urgency)
- CVE-2018-1999010 libavresample3 (remotely exploitable, high urgency)
- CVE-2018-1999011 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libavresample3 (remotely exploitable, high urgency)
- CVE-2018-1999013 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-6392 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavresample3 (remotely exploitable, low urgency)
- CVE-2018-7557 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavresample3 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavresample3 (remotely exploitable, low urgency)
- CVE-2017-11399 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14055 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14056 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14057 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14058 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14169 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14171 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14222 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14223 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-14225 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavutil55 (remotely exploitable, high urgency)
- CVE-2017-17081 libavutil55 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-12459 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-13300 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-13302 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-14395 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-15822 libavutil55 (low urgency)
- CVE-2018-1999010 libavutil55 (remotely exploitable, high urgency)
- CVE-2018-1999011 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libavutil55 (remotely exploitable, high urgency)
- CVE-2018-1999013 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-6392 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavutil55 (remotely exploitable, low urgency)
- CVE-2018-7557 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavutil55 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavutil55 (remotely exploitable, low urgency)
- CVE-2017-9118 php7.2-ldap (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-ldap (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-ldap
- CVE-2018-13440 libaudiofile1 (remotely exploitable, low urgency)
- CVE-2018-17095 libaudiofile1
- CVE-2017-17087 xxd (low urgency)
- CVE-2018-16384 modsecurity-crs (low urgency)
- CVE-2018-16062 libdw1
- CVE-2018-16402 libdw1 (low urgency)
- CVE-2018-16403 libdw1 (low urgency)
- CVE-2018-18310 libdw1
- CVE-2018-14048 libpng16-16 (remotely exploitable, medium urgency)
- CVE-2017-14617 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-14926 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-14928 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2017-18267 libpoppler-qt5-1 (remotely exploitable, medium urgency)
- CVE-2018-13988 libpoppler-qt5-1 (remotely exploitable, low urgency)
- CVE-2018-16646 libpoppler-qt5-1 (low urgency)
- CVE-2018-10754 libncursesw5 (remotely exploitable, low urgency)
- CVE-2018-14618 curl
- CVE-2017-12618 libaprutil1-dbd-sqlite3 (low urgency)
- CVE-2018-10017 libopenmpt0 (remotely exploitable, medium urgency)
- CVE-2018-11710 libopenmpt0 (remotely exploitable, medium urgency)
- CVE-2018-1000807 python-openssl
- CVE-2018-1000808 python-openssl (low urgency)
- CVE-2016-2779 libuuid1 (high urgency)
- CVE-2016-10209 libarchive13 (remotely exploitable, medium urgency)
- CVE-2016-10349 libarchive13 (remotely exploitable, medium urgency)
- CVE-2016-10350 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14166 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14501 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14502 libarchive13 (remotely exploitable, medium urgency)
- CVE-2017-14503 libarchive13 (remotely exploitable, medium urgency)
- CVE-2018-6594 python3-crypto (remotely exploitable, medium urgency)
- CVE-2017-9118 php7.2-curl (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-curl (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-curl
- CVE-2017-13884 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-13885 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7153 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7160 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7161 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2017-7165 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4088 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4089 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-4096 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
- CVE-2018-1333 apache2-utils (remotely exploitable, medium urgency)
- CVE-2016-2568 libpolkit-agent-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-agent-1-0 (low urgency)
- CVE-2018-14048 libpng-tools (remotely exploitable, medium urgency)
- CVE-2017-10268 mariadb-client-core-10.1 (low urgency)
- CVE-2017-10378 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-client-core-10.1 (medium urgency)
- CVE-2017-3641 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-client-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-client-core-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-client-core-10.1 (low urgency)
- CVE-2018-2761 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-client-core-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
- CVE-2016-2568 policykit-1 (medium urgency)
- CVE-2018-1116 policykit-1 (low urgency)
- CVE-2014-2886 gksu (remotely exploitable, medium urgency)
- CVE-2016-10228 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-1000408 multiarch-support (high urgency)
- CVE-2017-1000409 multiarch-support (medium urgency)
- CVE-2017-12132 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-15670 multiarch-support (remotely exploitable, high urgency)
- CVE-2017-15671 multiarch-support (remotely exploitable, medium urgency)
- CVE-2017-15804 multiarch-support (remotely exploitable, low urgency)
- CVE-2017-16997 multiarch-support (remotely exploitable, high urgency)
- CVE-2017-18269 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-1000001 multiarch-support (high urgency)
- CVE-2018-11236 multiarch-support (remotely exploitable, low urgency)
- CVE-2018-11237 multiarch-support (low urgency)
- CVE-2018-6485 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-6551 multiarch-support (remotely exploitable, high urgency)
- CVE-2018-1049 systemd-sysv (remotely exploitable, medium urgency)
- CVE-2018-6954 systemd-sysv (high urgency)
- CVE-2018-16062 libelf1
- CVE-2018-16402 libelf1 (low urgency)
- CVE-2018-16403 libelf1 (low urgency)
- CVE-2018-18310 libelf1
- CVE-2017-18198 libcdio-cdda1 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio-cdda1 (remotely exploitable, low urgency)
- CVE-2017-14617 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-14926 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-14928 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2017-18267 libpoppler64 (remotely exploitable, medium urgency)
- CVE-2018-13988 libpoppler64 (remotely exploitable, low urgency)
- CVE-2018-16646 libpoppler64 (low urgency)
- CVE-2018-16428 libglib2.0-0 (low urgency)
- CVE-2018-16429 libglib2.0-0 (low urgency)
- CVE-2018-9234 gpgv (remotely exploitable, low urgency)
- CVE-2017-11399 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14055 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14056 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14057 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14058 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14169 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14171 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14222 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14223 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-14225 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavfilter6 (remotely exploitable, high urgency)
- CVE-2017-17081 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-12459 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-13300 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-13302 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-14395 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-15822 libavfilter6 (low urgency)
- CVE-2018-1999010 libavfilter6 (remotely exploitable, high urgency)
- CVE-2018-1999011 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libavfilter6 (remotely exploitable, high urgency)
- CVE-2018-1999013 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-6392 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-7557 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavfilter6 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavfilter6 (remotely exploitable, low urgency)
- CVE-2018-5740 libisccfg140
- CVE-2016-2779 bsdutils (high urgency)
- CVE-2017-16612 libwayland-client0 (remotely exploitable, medium urgency)
- CVE-2017-11399 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14055 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14056 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14057 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14058 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14169 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14171 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14222 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14223 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-14225 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavcodec57 (remotely exploitable, high urgency)
- CVE-2017-17081 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-12459 libavcodec57 (remotely exploitable, low urgency)
- CVE-2018-13300 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavcodec57 (remotely exploitable, low urgency)
- CVE-2018-13302 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-14395 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-15822 libavcodec57 (low urgency)
- CVE-2018-1999010 libavcodec57 (remotely exploitable, high urgency)
- CVE-2018-1999011 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libavcodec57 (remotely exploitable, high urgency)
- CVE-2018-1999013 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-6392 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavcodec57 (remotely exploitable, low urgency)
- CVE-2018-7557 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavcodec57 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavcodec57 (remotely exploitable, low urgency)
- CVE-2017-7475 libcairo-gobject2 (remotely exploitable, low urgency)
- CVE-2017-9814 libcairo-gobject2 (remotely exploitable, low urgency)
- CVE-2018-18064 libcairo-gobject2
- CVE-2018-14618 libcurl4
- CVE-2016-9797 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9798 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9799 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9800 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9801 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9802 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9803 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9804 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9917 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2016-9918 libbluetooth3 (remotely exploitable, medium urgency)
- CVE-2017-1000250 libbluetooth3 (remotely exploitable, low urgency)
- CVE-2018-10910 libbluetooth3
- CVE-2018-9234 gnupg (remotely exploitable, low urgency)
- CVE-2018-1000035 unzip (remotely exploitable, medium urgency)
- CVE-2016-10723 linux-libc-dev (medium urgency)
- CVE-2016-8660 linux-libc-dev (low urgency)
- CVE-2017-18232 linux-libc-dev (low urgency)
- CVE-2017-18249 linux-libc-dev (medium urgency)
- CVE-2017-18255 linux-libc-dev (medium urgency)
- CVE-2017-5753 linux-libc-dev (medium urgency)
- CVE-2018-1000026 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-1000204 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-10021 linux-libc-dev (medium urgency)
- CVE-2018-10087 linux-libc-dev (low urgency)
- CVE-2018-10124 linux-libc-dev (low urgency)
- CVE-2018-10322 linux-libc-dev (medium urgency)
- CVE-2018-10853 linux-libc-dev
- CVE-2018-10876 linux-libc-dev (medium urgency)
- CVE-2018-10877 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-10878 linux-libc-dev (medium urgency)
- CVE-2018-10879 linux-libc-dev (medium urgency)
- CVE-2018-10880 linux-libc-dev (remotely exploitable, high urgency)
- CVE-2018-10881 linux-libc-dev (medium urgency)
- CVE-2018-10882 linux-libc-dev (medium urgency)
- CVE-2018-10883 linux-libc-dev (medium urgency)
- CVE-2018-10902 linux-libc-dev
- CVE-2018-10938 linux-libc-dev
- CVE-2018-10940 linux-libc-dev (medium urgency)
- CVE-2018-1108 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-1118 linux-libc-dev (low urgency)
- CVE-2018-1120 linux-libc-dev (remotely exploitable, low urgency)
- CVE-2018-1130 linux-libc-dev (medium urgency)
- CVE-2018-11506 linux-libc-dev (high urgency)
- CVE-2018-12233 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-12928 linux-libc-dev (medium urgency)
- CVE-2018-13053 linux-libc-dev (medium urgency)
- CVE-2018-13094 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-13096 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-13099 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-13405 linux-libc-dev (medium urgency)
- CVE-2018-14609 linux-libc-dev (remotely exploitable, high urgency)
- CVE-2018-14617 linux-libc-dev (remotely exploitable, high urgency)
- CVE-2018-14633 linux-libc-dev
- CVE-2018-14678 linux-libc-dev (high urgency)
- CVE-2018-14734 linux-libc-dev (medium urgency)
- CVE-2018-15572 linux-libc-dev
- CVE-2018-15594 linux-libc-dev
- CVE-2018-16276 linux-libc-dev
- CVE-2018-16658 linux-libc-dev
- CVE-2018-17182 linux-libc-dev
- CVE-2018-3620 linux-libc-dev (medium urgency)
- CVE-2018-3639 linux-libc-dev (medium urgency)
- CVE-2018-3646 linux-libc-dev (medium urgency)
- CVE-2018-5390 linux-libc-dev (remotely exploitable, high urgency)
- CVE-2018-5391 linux-libc-dev
- CVE-2018-5814 linux-libc-dev (medium urgency)
- CVE-2018-6412 linux-libc-dev (remotely exploitable, medium urgency)
- CVE-2018-6554 linux-libc-dev
- CVE-2018-6555 linux-libc-dev
- CVE-2018-7273 linux-libc-dev (medium urgency)
- CVE-2018-7755 linux-libc-dev (low urgency)
- CVE-2018-9363 linux-libc-dev
- CVE-2018-9516 linux-libc-dev
- CVE-2016-2779 mount (high urgency)
- CVE-2018-10844 libgnutls30
- CVE-2018-10845 libgnutls30
- CVE-2018-10846 libgnutls30
- CVE-2018-14598 libx11-6 (low urgency)
- CVE-2018-14599 libx11-6 (low urgency)
- CVE-2018-14600 libx11-6 (low urgency)
- CVE-2017-6888 libflac8 (remotely exploitable, low urgency)
- CVE-2018-1333 apache2-bin (remotely exploitable, medium urgency)
- CVE-2018-1049 libsystemd0 (remotely exploitable, medium urgency)
- CVE-2018-6954 libsystemd0 (high urgency)
- CVE-2018-5740 libdns-export162
- CVE-2016-10228 libc6 (remotely exploitable, medium urgency)
- CVE-2018-14526 wpasupplicant
- CVE-2018-1000222 libgd3 (remotely exploitable, low urgency)
- CVE-2018-5711 libgd3 (remotely exploitable, medium urgency)
- CVE-2018-1333 apache2-data (remotely exploitable, medium urgency)
- CVE-2018-12384 libnss3 (low urgency)
- CVE-2017-16611 libxfont2 (low urgency)
- CVE-2017-11613 libtiff5 (remotely exploitable, medium urgency)
- CVE-2017-17942 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-10963 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-12900 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-15209 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-16335 libtiff5
- CVE-2018-17000 libtiff5
- CVE-2018-17100 libtiff5
- CVE-2018-17101 libtiff5
- CVE-2018-17795 libtiff5
- CVE-2018-5360 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-5784 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-7456 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-8905 libtiff5 (remotely exploitable, medium urgency)
- CVE-2018-15607 imagemagick-6.q16 (low urgency)
- CVE-2018-16323 imagemagick-6.q16
- CVE-2018-16412 imagemagick-6.q16
- CVE-2018-16413 imagemagick-6.q16
- CVE-2018-16644 imagemagick-6.q16
- CVE-2018-16645 imagemagick-6.q16
- CVE-2018-18024 imagemagick-6.q16 (low urgency)
- CVE-2018-18025 imagemagick-6.q16
- CVE-2016-2779 libfdisk1 (high urgency)
- CVE-2016-3977 libgif7 (remotely exploitable, medium urgency)
- CVE-2018-11489 libgif7 (remotely exploitable, medium urgency)
- CVE-2018-11490 libgif7 (remotely exploitable, medium urgency)
- CVE-2016-1516 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-core2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-core2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-core2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-core2.4v5 (remotely exploitable, low urgency)
- CVE-2018-5740 dnsutils
- CVE-2016-1516 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
- CVE-2017-1000418 libwildmidi2 (remotely exploitable, medium urgency)
- CVE-2017-11661 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11662 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11663 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2017-11664 libwildmidi2 (remotely exploitable, low urgency)
- CVE-2018-4117 chromium-browser-l10n (remotely exploitable, medium urgency)
- CVE-2016-2781 coreutils (low urgency)
- CVE-2017-12596 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-14988 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9110 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9111 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9112 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9113 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9114 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9115 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-9116 libopenexr22 (remotely exploitable, medium urgency)
- CVE-2017-11399 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-11665 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-11719 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14054 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14055 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14056 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14057 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14058 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14059 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14169 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14170 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14171 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14222 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14223 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-14225 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-14767 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-15186 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-15672 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-16840 libswresample2 (remotely exploitable, high urgency)
- CVE-2017-17081 libswresample2 (remotely exploitable, medium urgency)
- CVE-2017-9608 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-10001 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-12458 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-12459 libswresample2 (remotely exploitable, low urgency)
- CVE-2018-13300 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13301 libswresample2 (remotely exploitable, low urgency)
- CVE-2018-13302 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13303 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-13304 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-14394 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-14395 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-15822 libswresample2 (low urgency)
- CVE-2018-1999010 libswresample2 (remotely exploitable, high urgency)
- CVE-2018-1999011 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libswresample2 (remotely exploitable, high urgency)
- CVE-2018-1999013 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-6392 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-6621 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-6912 libswresample2 (remotely exploitable, low urgency)
- CVE-2018-7557 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-7751 libswresample2 (remotely exploitable, medium urgency)
- CVE-2018-9841 libswresample2 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5printsupport5 (remotely exploitable, medium urgency)
- CVE-2017-11462 libkrb5support0 (remotely exploitable, low urgency)
- CVE-2018-5710 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2018-5729 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2018-5730 libkrb5support0 (remotely exploitable, medium urgency)
- CVE-2017-10971 xserver-xorg-core (remotely exploitable, medium urgency)
- CVE-2017-10972 xserver-xorg-core (remotely exploitable, medium urgency)
- CVE-2017-12176 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12177 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12178 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12179 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12180 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12181 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12182 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12183 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12184 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12185 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12186 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-12187 xserver-xorg-core (remotely exploitable, high urgency)
- CVE-2017-13721 xserver-xorg-core (low urgency)
- CVE-2017-13723 xserver-xorg-core (medium urgency)
- CVE-2018-15853 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15854 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15855 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15856 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15857 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15858 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15859 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15861 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15862 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15863 libxkbcommon-x11-0 (low urgency)
- CVE-2018-15864 libxkbcommon-x11-0 (low urgency)
- CVE-2017-9118 php7.2-mbstring (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-mbstring (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-mbstring
- CVE-2017-11464 librsvg2-common (remotely exploitable, medium urgency)
- CVE-2017-12852 python-numpy (remotely exploitable, medium urgency)
- CVE-2016-9318 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-16932 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-18258 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-5130 libxml2 (remotely exploitable, medium urgency)
- CVE-2017-5969 libxml2 (remotely exploitable, low urgency)
- CVE-2017-8872 libxml2 (remotely exploitable, medium urgency)
- CVE-2018-14404 libxml2 (remotely exploitable, medium urgency)
- CVE-2018-14567 libxml2 (remotely exploitable, medium urgency)
- CVE-2016-2779 libblkid1 (high urgency)
- CVE-2018-1000654 libtasn1-6
- CVE-2018-7999 libgraphite2-3 (remotely exploitable, medium urgency)
- CVE-2018-5764 rsync (remotely exploitable, medium urgency)
- CVE-2017-8834 libcroco3 (remotely exploitable, low urgency)
- CVE-2017-8871 libcroco3 (remotely exploitable, low urgency)
- CVE-2017-11462 libgssapi-krb5-2 (remotely exploitable, low urgency)
- CVE-2018-5710 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2018-5729 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2018-5730 libgssapi-krb5-2 (remotely exploitable, medium urgency)
- CVE-2016-4607 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4608 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4609 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2016-4610 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2017-2477 libxslt1.1 (remotely exploitable, high urgency)
- CVE-2018-15919 ssh
- CVE-2016-1516 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
- CVE-2017-14107 libzip4 (remotely exploitable, medium urgency)
- CVE-2017-9118 php7.2-bz2 (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-bz2 (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-bz2
- CVE-2016-10040 libqt5sql5-sqlite (remotely exploitable, medium urgency)
- CVE-2017-1000418 libwildmidi-config (remotely exploitable, medium urgency)
- CVE-2017-11661 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11662 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11663 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-11664 libwildmidi-config (remotely exploitable, low urgency)
- CVE-2017-9118 php7.2-readline (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-readline (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-readline
- CVE-2017-12562 libsndfile1 (remotely exploitable, high urgency)
- CVE-2017-14245 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-14246 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-14634 libsndfile1 (remotely exploitable, medium urgency)
- CVE-2017-17456 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-17457 libsndfile1 (remotely exploitable, low urgency)
- CVE-2017-6892 libsndfile1 (remotely exploitable, medium urgency)
- CVE-2018-13419 libsndfile1 (remotely exploitable, low urgency)
- CVE-2018-0732 libssl1.0.2 (remotely exploitable, low urgency)
- CVE-2018-0737 libssl1.0.2 (remotely exploitable, low urgency)
- CVE-2017-18248 libcupsimage2 (remotely exploitable, low urgency)
- CVE-2017-9216 libjbig2dec0 (remotely exploitable, medium urgency)
- CVE-2018-14598 libx11-xcb1 (low urgency)
- CVE-2018-14599 libx11-xcb1 (low urgency)
- CVE-2018-14600 libx11-xcb1 (low urgency)
- CVE-2016-9811 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2017-5837 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2017-5844 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
- CVE-2018-5740 libisccc140
- CVE-2017-13712 libmp3lame0 (remotely exploitable, low urgency)
- CVE-2017-15019 libmp3lame0 (remotely exploitable, medium urgency)
- CVE-2015-9262 libxcursor1 (remotely exploitable, high urgency)
- CVE-2018-16428 libglib2.0-data (low urgency)
- CVE-2018-16429 libglib2.0-data (low urgency)
- CVE-2017-13704 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14491 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14492 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14493 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-14494 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14495 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-14496 dnsmasq (remotely exploitable, high urgency)
- CVE-2017-15107 dnsmasq (remotely exploitable, medium urgency)
- CVE-2017-12424 passwd (remotely exploitable, high urgency)
- CVE-2018-7169 passwd (remotely exploitable, medium urgency)
- CVE-2017-9118 php7.2 (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2 (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2
- CVE-2018-15919 openssh-server
- CVE-2016-2568 libpolkit-backend-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-backend-1-0 (low urgency)
- CVE-2018-15919 openssh-sftp-server
- CVE-2018-15607 libmagickwand-6.q16-6 (low urgency)
- CVE-2018-16323 libmagickwand-6.q16-6
- CVE-2018-16412 libmagickwand-6.q16-6
- CVE-2018-16413 libmagickwand-6.q16-6
- CVE-2018-16644 libmagickwand-6.q16-6
- CVE-2018-16645 libmagickwand-6.q16-6
- CVE-2018-18024 libmagickwand-6.q16-6 (low urgency)
- CVE-2018-18025 libmagickwand-6.q16-6
- CVE-2018-10754 ncurses-base (remotely exploitable, low urgency)
- CVE-2016-10228 libc-bin (remotely exploitable, medium urgency)
- CVE-2017-1000445 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
- CVE-2018-15607 libmagickcore-6.q16-3-extra (low urgency)
- CVE-2018-16323 libmagickcore-6.q16-3-extra
- CVE-2018-16643 libmagickcore-6.q16-3-extra (low urgency)
- CVE-2018-16749 libmagickcore-6.q16-3-extra (low urgency)
- CVE-2018-18024 libmagickcore-6.q16-3-extra (low urgency)
- CVE-2018-18025 libmagickcore-6.q16-3-extra
- CVE-2018-7443 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
- CVE-2016-10040 libqt5xml5 (remotely exploitable, medium urgency)
- CVE-2018-15607 libmagickcore-6.q16-6 (low urgency)
- CVE-2018-16323 libmagickcore-6.q16-6
- CVE-2018-16412 libmagickcore-6.q16-6
- CVE-2018-16413 libmagickcore-6.q16-6
- CVE-2018-16644 libmagickcore-6.q16-6
- CVE-2018-16645 libmagickcore-6.q16-6
- CVE-2018-18024 libmagickcore-6.q16-6 (low urgency)
- CVE-2018-18025 libmagickcore-6.q16-6
- CVE-2018-1049 udev (remotely exploitable, medium urgency)
- CVE-2018-6954 udev (high urgency)
- CVE-2017-11399 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-11665 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-11719 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14054 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14055 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14056 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14057 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14058 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14059 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14169 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14170 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14171 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14222 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14223 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-14225 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-14767 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-15186 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-15672 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-16840 libswscale4 (remotely exploitable, high urgency)
- CVE-2017-17081 libswscale4 (remotely exploitable, medium urgency)
- CVE-2017-9608 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-10001 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-12458 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-12459 libswscale4 (remotely exploitable, low urgency)
- CVE-2018-13300 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13301 libswscale4 (remotely exploitable, low urgency)
- CVE-2018-13302 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13303 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-13304 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-14394 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-14395 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-15822 libswscale4 (low urgency)
- CVE-2018-1999010 libswscale4 (remotely exploitable, high urgency)
- CVE-2018-1999011 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libswscale4 (remotely exploitable, high urgency)
- CVE-2018-1999013 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-6392 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-6621 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-6912 libswscale4 (remotely exploitable, low urgency)
- CVE-2018-7557 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-7751 libswscale4 (remotely exploitable, medium urgency)
- CVE-2018-9841 libswscale4 (remotely exploitable, low urgency)
- CVE-2017-9118 php7.2-cli (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-cli (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-cli
- CVE-2016-10040 libqt5gui5 (remotely exploitable, medium urgency)
- CVE-2018-14622 libtirpc1
- CVE-2018-4117 chromium-codecs-ffmpeg-extra (remotely exploitable, medium urgency)
- CVE-2018-0732 libssl1.1 (remotely exploitable, medium urgency)
- CVE-2018-0737 libssl1.1 (remotely exploitable, medium urgency)
- CVE-2017-12618 libaprutil1 (low urgency)
- CVE-2016-10228 libc-l10n (remotely exploitable, medium urgency)
- CVE-2018-1049 systemd (remotely exploitable, medium urgency)
- CVE-2018-6954 systemd (high urgency)
- CVE-2018-5740 liblwres141
- CVE-2016-10040 libqt5sql5 (remotely exploitable, medium urgency)
- CVE-2017-1000445 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-1000476 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-11531 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11532 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11534 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11539 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11644 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11724 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11751 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-11752 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12140 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12418 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12427 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12429 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12430 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12433 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12435 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12563 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12564 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12565 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12566 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12641 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12642 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12643 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12654 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12664 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12665 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12668 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12670 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12674 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12675 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12676 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-12691 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12692 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12693 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-12875 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13061 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13133 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-13146 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13658 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-13768 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14060 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14172 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14173 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14174 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14175 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14249 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14341 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14400 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14505 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14528 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14532 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-14624 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14625 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14626 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-14739 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-14741 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15015 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-15016 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15017 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-15217 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-15281 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2017-17681 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-17682 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-17914 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18209 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18211 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18252 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2017-18271 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2017-18273 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-10177 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10804 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-10805 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-14551 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
- CVE-2018-15607 libmagickwand-6.q16-3 (low urgency)
- CVE-2018-16323 libmagickwand-6.q16-3
- CVE-2018-16643 libmagickwand-6.q16-3 (low urgency)
- CVE-2018-16749 libmagickwand-6.q16-3 (low urgency)
- CVE-2018-18024 libmagickwand-6.q16-3 (low urgency)
- CVE-2018-18025 libmagickwand-6.q16-3
- CVE-2018-7443 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-8804 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-8960 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
- CVE-2018-9133 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
- CVE-2018-0732 openssl (remotely exploitable, medium urgency)
- CVE-2018-0737 openssl (remotely exploitable, medium urgency)
- CVE-2017-11399 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-11665 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-11719 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14054 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14055 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14056 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14057 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14058 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14059 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14169 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14170 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14171 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14222 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14223 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-14225 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-14767 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-15186 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-15672 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-16840 libpostproc54 (remotely exploitable, high urgency)
- CVE-2017-17081 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2017-9608 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-10001 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-12458 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-12459 libpostproc54 (remotely exploitable, low urgency)
- CVE-2018-13300 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13301 libpostproc54 (remotely exploitable, low urgency)
- CVE-2018-13302 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13303 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-13304 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-14394 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-14395 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-15822 libpostproc54 (low urgency)
- CVE-2018-1999010 libpostproc54 (remotely exploitable, high urgency)
- CVE-2018-1999011 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libpostproc54 (remotely exploitable, high urgency)
- CVE-2018-1999013 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-6392 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-6621 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-6912 libpostproc54 (remotely exploitable, low urgency)
- CVE-2018-7557 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-7751 libpostproc54 (remotely exploitable, medium urgency)
- CVE-2018-9841 libpostproc54 (remotely exploitable, low urgency)
- CVE-2017-17087 vim-common (low urgency)
- CVE-2018-8740 libsqlite3-0 (remotely exploitable, medium urgency)
- CVE-2018-15607 imagemagick (low urgency)
- CVE-2018-16323 imagemagick
- CVE-2018-16412 imagemagick
- CVE-2018-16413 imagemagick
- CVE-2018-16644 imagemagick
- CVE-2018-16645 imagemagick
- CVE-2018-18024 imagemagick (low urgency)
- CVE-2018-18025 imagemagick
- CVE-2018-18074 python3-requests (low urgency)
- CVE-2017-13704 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14491 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14492 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14493 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-14494 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14495 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2017-14496 dnsmasq-base (remotely exploitable, high urgency)
- CVE-2017-15107 dnsmasq-base (remotely exploitable, medium urgency)
- CVE-2018-18074 python-requests (low urgency)
- CVE-2018-15853 libxkbcommon0 (low urgency)
- CVE-2018-15854 libxkbcommon0 (low urgency)
- CVE-2018-15855 libxkbcommon0 (low urgency)
- CVE-2018-15856 libxkbcommon0 (low urgency)
- CVE-2018-15857 libxkbcommon0 (low urgency)
- CVE-2018-15858 libxkbcommon0 (low urgency)
- CVE-2018-15859 libxkbcommon0 (low urgency)
- CVE-2018-15861 libxkbcommon0 (low urgency)
- CVE-2018-15862 libxkbcommon0 (low urgency)
- CVE-2018-15863 libxkbcommon0 (low urgency)
- CVE-2018-15864 libxkbcommon0 (low urgency)
- CVE-2018-1000807 python3-openssl
- CVE-2018-1000808 python3-openssl (low urgency)
- CVE-2017-9118 php7.2-json (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-json (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-json
- CVE-2017-9118 php7.2-intl (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-intl (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-intl
- CVE-2017-13884 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-13885 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7153 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7160 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7161 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-7165 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4088 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4089 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2018-4096 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
- CVE-2017-11462 libkrb5-3 (remotely exploitable, low urgency)
- CVE-2018-5710 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2018-5729 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2018-5730 libkrb5-3 (remotely exploitable, medium urgency)
- CVE-2017-11671 gcc-4.9-base (low urgency)
- CVE-2017-12448 binutils (remotely exploitable, medium urgency)
- CVE-2017-12449 binutils (remotely exploitable, medium urgency)
- CVE-2017-12450 binutils (remotely exploitable, medium urgency)
- CVE-2017-12451 binutils (remotely exploitable, medium urgency)
- CVE-2017-12452 binutils (remotely exploitable, medium urgency)
- CVE-2017-12453 binutils (remotely exploitable, medium urgency)
- CVE-2017-12454 binutils (remotely exploitable, medium urgency)
- CVE-2017-12455 binutils (remotely exploitable, medium urgency)
- CVE-2017-12456 binutils (remotely exploitable, medium urgency)
- CVE-2017-12457 binutils (remotely exploitable, medium urgency)
- CVE-2017-12458 binutils (remotely exploitable, medium urgency)
- CVE-2017-12459 binutils (remotely exploitable, medium urgency)
- CVE-2017-12799 binutils (remotely exploitable, medium urgency)
- CVE-2017-12967 binutils (remotely exploitable, medium urgency)
- CVE-2017-13710 binutils (remotely exploitable, medium urgency)
- CVE-2017-13716 binutils (remotely exploitable, low urgency)
- CVE-2017-13757 binutils (remotely exploitable, medium urgency)
- CVE-2017-14128 binutils (remotely exploitable, low urgency)
- CVE-2017-14129 binutils (remotely exploitable, low urgency)
- CVE-2017-14130 binutils (remotely exploitable, low urgency)
- CVE-2017-14333 binutils (remotely exploitable, medium urgency)
- CVE-2017-14529 binutils (remotely exploitable, medium urgency)
- CVE-2017-14729 binutils (remotely exploitable, medium urgency)
- CVE-2017-14745 binutils (remotely exploitable, medium urgency)
- CVE-2017-14930 binutils (remotely exploitable, high urgency)
- CVE-2017-14932 binutils (remotely exploitable, medium urgency)
- CVE-2017-14933 binutils (remotely exploitable, medium urgency)
- CVE-2017-14934 binutils (remotely exploitable, medium urgency)
- CVE-2017-14938 binutils (remotely exploitable, medium urgency)
- CVE-2017-14939 binutils (remotely exploitable, medium urgency)
- CVE-2017-14940 binutils (remotely exploitable, medium urgency)
- CVE-2017-14974 binutils (remotely exploitable, medium urgency)
- CVE-2017-15020 binutils (remotely exploitable, medium urgency)
- CVE-2017-15021 binutils (remotely exploitable, medium urgency)
- CVE-2017-15022 binutils (remotely exploitable, medium urgency)
- CVE-2017-15023 binutils (remotely exploitable, medium urgency)
- CVE-2017-15024 binutils (remotely exploitable, medium urgency)
- CVE-2017-15025 binutils (remotely exploitable, medium urgency)
- CVE-2017-15225 binutils (remotely exploitable, medium urgency)
- CVE-2017-15938 binutils (remotely exploitable, medium urgency)
- CVE-2017-15996 binutils (remotely exploitable, medium urgency)
- CVE-2017-16826 binutils (remotely exploitable, medium urgency)
- CVE-2017-16827 binutils (remotely exploitable, medium urgency)
- CVE-2017-16828 binutils (remotely exploitable, medium urgency)
- CVE-2017-16829 binutils (remotely exploitable, medium urgency)
- CVE-2017-16830 binutils (remotely exploitable, medium urgency)
- CVE-2017-16831 binutils (remotely exploitable, medium urgency)
- CVE-2017-16832 binutils (remotely exploitable, medium urgency)
- CVE-2017-17080 binutils (remotely exploitable, medium urgency)
- CVE-2017-17121 binutils (remotely exploitable, medium urgency)
- CVE-2017-17122 binutils (remotely exploitable, medium urgency)
- CVE-2017-17123 binutils (remotely exploitable, medium urgency)
- CVE-2017-17124 binutils (remotely exploitable, medium urgency)
- CVE-2017-17125 binutils (remotely exploitable, medium urgency)
- CVE-2017-17126 binutils (remotely exploitable, medium urgency)
- CVE-2017-9038 binutils (remotely exploitable, low urgency)
- CVE-2017-9039 binutils (remotely exploitable, low urgency)
- CVE-2017-9040 binutils (remotely exploitable, low urgency)
- CVE-2017-9041 binutils (remotely exploitable, low urgency)
- CVE-2017-9042 binutils (remotely exploitable, low urgency)
- CVE-2017-9043 binutils (remotely exploitable, low urgency)
- CVE-2017-9044 binutils (remotely exploitable, low urgency)
- CVE-2017-9742 binutils (remotely exploitable, low urgency)
- CVE-2017-9743 binutils (remotely exploitable, low urgency)
- CVE-2017-9744 binutils (remotely exploitable, low urgency)
- CVE-2017-9745 binutils (remotely exploitable, low urgency)
- CVE-2017-9746 binutils (remotely exploitable, low urgency)
- CVE-2017-9747 binutils (remotely exploitable, low urgency)
- CVE-2017-9748 binutils (remotely exploitable, low urgency)
- CVE-2017-9749 binutils (remotely exploitable, low urgency)
- CVE-2017-9750 binutils (remotely exploitable, low urgency)
- CVE-2017-9751 binutils (remotely exploitable, low urgency)
- CVE-2017-9752 binutils (remotely exploitable, low urgency)
- CVE-2017-9753 binutils (remotely exploitable, low urgency)
- CVE-2017-9754 binutils (remotely exploitable, low urgency)
- CVE-2017-9755 binutils (remotely exploitable, low urgency)
- CVE-2017-9756 binutils (remotely exploitable, low urgency)
- CVE-2017-9954 binutils (remotely exploitable, medium urgency)
- CVE-2017-9955 binutils (remotely exploitable, medium urgency)
- CVE-2018-10372 binutils (remotely exploitable, medium urgency)
- CVE-2018-10373 binutils (remotely exploitable, medium urgency)
- CVE-2018-10534 binutils (remotely exploitable, medium urgency)
- CVE-2018-10535 binutils (remotely exploitable, medium urgency)
- CVE-2018-12641 binutils (remotely exploitable, low urgency)
- CVE-2018-12697 binutils (remotely exploitable, low urgency)
- CVE-2018-12698 binutils (remotely exploitable, low urgency)
- CVE-2018-12699 binutils (remotely exploitable, low urgency)
- CVE-2018-12700 binutils (remotely exploitable, low urgency)
- CVE-2018-12934 binutils (remotely exploitable, low urgency)
- CVE-2018-13033 binutils (remotely exploitable, low urgency)
- CVE-2018-17358 binutils
- CVE-2018-17359 binutils
- CVE-2018-17360 binutils
- CVE-2018-17794 binutils (low urgency)
- CVE-2018-17985 binutils
- CVE-2018-18309 binutils
- CVE-2018-6323 binutils (remotely exploitable, medium urgency)
- CVE-2018-6543 binutils (remotely exploitable, medium urgency)
- CVE-2018-6759 binutils (remotely exploitable, medium urgency)
- CVE-2018-6872 binutils (remotely exploitable, medium urgency)
- CVE-2018-7208 binutils (remotely exploitable, medium urgency)
- CVE-2018-7568 binutils (remotely exploitable, medium urgency)
- CVE-2018-7569 binutils (remotely exploitable, medium urgency)
- CVE-2018-7570 binutils (remotely exploitable, medium urgency)
- CVE-2018-7642 binutils (remotely exploitable, medium urgency)
- CVE-2018-7643 binutils (remotely exploitable, medium urgency)
- CVE-2018-8945 binutils (remotely exploitable, low urgency)
- CVE-2018-9138 binutils (remotely exploitable, low urgency)
- CVE-2018-9996 binutils (remotely exploitable, low urgency)
- CVE-2017-18198 libcdio-paranoia1 (remotely exploitable, low urgency)
- CVE-2017-18199 libcdio-paranoia1 (remotely exploitable, low urgency)
- CVE-2016-10228 libc-dev-bin (remotely exploitable, medium urgency)
- CVE-2017-17446 libgme0 (remotely exploitable, medium urgency)
- CVE-2016-10040 qt5-gtk-platformtheme (remotely exploitable, medium urgency)
- CVE-2018-14048 libpng-dev (remotely exploitable, medium urgency)
- CVE-2018-5740 libbind9-140
- CVE-2017-10268 mariadb-server (low urgency)
- CVE-2017-10378 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server (medium urgency)
- CVE-2017-3641 mariadb-server (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server (low urgency)
- CVE-2018-2761 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-server (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server (remotely exploitable, medium urgency)
- CVE-2016-2779 libmount1 (high urgency)
- CVE-2018-1000656 python-flask
- CVE-2017-14160 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbisenc2 (remotely exploitable, medium urgency)
- CVE-2018-1000223 libsoundtouch1 (remotely exploitable, medium urgency)
- CVE-2018-14044 libsoundtouch1 (remotely exploitable, low urgency)
- CVE-2018-14045 libsoundtouch1 (remotely exploitable, low urgency)
- CVE-2018-17096 libsoundtouch1 (low urgency)
- CVE-2018-17097 libsoundtouch1 (low urgency)
- CVE-2018-17098 libsoundtouch1 (low urgency)
- CVE-2016-1516 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
- CVE-2016-1516 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-flann2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-flann2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-flann2.4v5 (remotely exploitable, low urgency)
- CVE-2017-12424 login (remotely exploitable, high urgency)
- CVE-2018-7169 login (remotely exploitable, medium urgency)
- CVE-2018-9234 gnupg-agent (remotely exploitable, low urgency)
- CVE-2017-7697 libsamplerate0 (remotely exploitable, medium urgency)
- CVE-2016-1516 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-video2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-video2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-video2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-video2.4v5 (remotely exploitable, low urgency)
- CVE-2017-10268 mariadb-server-10.1 (low urgency)
- CVE-2017-10378 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-15365 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3636 mariadb-server-10.1 (medium urgency)
- CVE-2017-3641 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-3653 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2562 mariadb-server-10.1 (remotely exploitable, high urgency)
- CVE-2018-2612 mariadb-server-10.1 (remotely exploitable, high urgency)
- CVE-2018-2622 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2640 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2665 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2668 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2755 mariadb-server-10.1 (low urgency)
- CVE-2018-2761 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2766 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2767 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2771 mariadb-server-10.1 (remotely exploitable, low urgency)
- CVE-2018-2781 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2782 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2784 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2787 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2813 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2817 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-2819 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3058 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3063 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3064 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3066 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2018-3081 mariadb-server-10.1 (remotely exploitable, medium urgency)
- CVE-2017-14160 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2018-10392 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2018-10393 libvorbis0a (remotely exploitable, medium urgency)
- CVE-2002-2439 gcc-4.7-base (low urgency)
- CVE-2014-5044 gcc-4.7-base (remotely exploitable, high urgency)
- CVE-2017-11671 gcc-4.7-base (low urgency)
- CVE-2002-2439 gcc-4.6-base (low urgency)
- CVE-2014-5044 gcc-4.6-base (remotely exploitable, high urgency)
- CVE-2017-11671 gcc-4.6-base (low urgency)
- CVE-2016-9811 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2017-5837 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2017-5844 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
- CVE-2018-15919 openssh-client
- CVE-2018-10754 ncurses-bin (remotely exploitable, low urgency)
- CVE-2018-9234 dirmngr (remotely exploitable, low urgency)
- CVE-2017-10683 libmpg123-0 (remotely exploitable, medium urgency)
- CVE-2017-12797 libmpg123-0 (remotely exploitable, medium urgency)
- CVE-2017-9545 libmpg123-0 (remotely exploitable, low urgency)
- CVE-2016-9797 bluez (remotely exploitable, medium urgency)
- CVE-2016-9798 bluez (remotely exploitable, medium urgency)
- CVE-2016-9799 bluez (remotely exploitable, medium urgency)
- CVE-2016-9800 bluez (remotely exploitable, medium urgency)
- CVE-2016-9801 bluez (remotely exploitable, medium urgency)
- CVE-2016-9802 bluez (remotely exploitable, medium urgency)
- CVE-2016-9803 bluez (remotely exploitable, medium urgency)
- CVE-2016-9804 bluez (remotely exploitable, medium urgency)
- CVE-2016-9917 bluez (remotely exploitable, medium urgency)
- CVE-2016-9918 bluez (remotely exploitable, medium urgency)
- CVE-2017-1000250 bluez (remotely exploitable, low urgency)
- CVE-2018-10910 bluez
- CVE-2018-11645 libgs9 (remotely exploitable, medium urgency)
- CVE-2018-17961 libgs9
- CVE-2018-18073 libgs9
- CVE-2018-18284 libgs9
- CVE-2017-11399 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-11665 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-11719 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14054 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14055 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14056 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14057 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14058 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14059 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14169 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14170 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14171 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14222 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14223 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-14225 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-14767 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-15186 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-15672 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-16840 libavformat57 (remotely exploitable, high urgency)
- CVE-2017-17081 libavformat57 (remotely exploitable, medium urgency)
- CVE-2017-9608 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-10001 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-12458 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-12459 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-13300 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13301 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-13302 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13303 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-13304 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-14394 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-14395 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-15822 libavformat57 (low urgency)
- CVE-2018-1999010 libavformat57 (remotely exploitable, high urgency)
- CVE-2018-1999011 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-1999012 libavformat57 (remotely exploitable, high urgency)
- CVE-2018-1999013 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-1999014 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-1999015 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-6392 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-6621 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-6912 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-7557 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-7751 libavformat57 (remotely exploitable, medium urgency)
- CVE-2018-9841 libavformat57 (remotely exploitable, low urgency)
- CVE-2018-16428 libglib2.0-bin (low urgency)
- CVE-2018-16429 libglib2.0-bin (low urgency)
- CVE-2016-10228 libc6-dev (remotely exploitable, medium urgency)
- CVE-2016-10517 redis-server (remotely exploitable, medium urgency)
- CVE-2017-9525 cron (medium urgency)
- CVE-2016-6328 libexif12
- CVE-2017-7544 libexif12 (remotely exploitable, medium urgency)
- CVE-2017-16612 libwayland-cursor0 (remotely exploitable, medium urgency)
- CVE-2016-10228 locales (remotely exploitable, medium urgency)
- CVE-2016-1516 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2016-1517 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-1000450 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12597 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12598 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12599 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12600 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12601 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12602 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
- CVE-2017-12603 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12604 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12605 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12606 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12862 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12863 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-12864 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2017-17760 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5268 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-5269 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
- CVE-2018-7712 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7713 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2018-7714 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
- CVE-2016-10040 libqt5concurrent5 (remotely exploitable, medium urgency)
- CVE-2018-14598 libx11-data (low urgency)
- CVE-2018-14599 libx11-data (low urgency)
- CVE-2018-14600 libx11-data (low urgency)
- CVE-2017-14062 libidn11 (remotely exploitable, high urgency)
- CVE-2016-2568 libpolkit-gobject-1-0 (medium urgency)
- CVE-2018-1116 libpolkit-gobject-1-0 (low urgency)
- CVE-2016-2779 util-linux (high urgency)
- CVE-2017-12678 libtag1v5-vanilla (remotely exploitable, medium urgency)
- CVE-2018-11439 libtag1v5-vanilla (remotely exploitable, medium urgency)
- CVE-2017-11671 gcc-5-base (low urgency)
- CVE-2017-18248 libcups2 (remotely exploitable, low urgency)
- CVE-2016-2779 libsmartcols1 (high urgency)
- CVE-2017-9118 php7.2-opcache (remotely exploitable, medium urgency)
- CVE-2017-9120 php7.2-opcache (remotely exploitable, high urgency)
- CVE-2018-17082 php7.2-opcache
- CVE-2017-12618 libaprutil1-ldap (low urgency)
- CVE-2017-16612 libwayland-server0 (remotely exploitable, medium urgency)
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert not yet due for renewal
- Keeping the existing certificate
- -------------------------------------------------------------------------------
- Certificate not yet due for renewal; no action taken.
- -------------------------------------------------------------------------------
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- [ nc-prettyURL ]
- System config value htaccess.RewriteBase set to string /
- .htaccess has been updated
- Your cloud now has a pretty domain name.
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- previewgenerator already installed
- previewgenerator enabled
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- System config value trusted_domains => 7 set to string nextcloudpi
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- NextCloudPi updated to version v0.64.2
- [ DDNS_no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- noip DDNS enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ nc-limits ]
- Using 729179136B for PHP
- Using 4 PHP threads
- Using 729179136B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- Cannot load Zend OPcache - it was already loaded
- System config value trusted_domains => 7 set to string nextcloudpi
- Cannot load Zend OPcache - it was already loaded
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- Cannot load Zend OPcache - it was already loaded
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u2).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 https://packages.sury.org/php stretch InRelease
- Hit:3 http://archive.raspberrypi.org/debian stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- NextCloudPi updated to version v0.66.1
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ncp-update-nc]
- Cannot load Zend OPcache - it was already loaded
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.3
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.3.0
- Available Nextcloud version 14.0.4
- Download Nextcloud 14.0.4...
- Back up current instance...
- check free space...
- Maintenance mode enabled
- backup database...
- backup base files...
- compressing backup file...
- backup /var/www//nextcloud-bkp_20181126_1543210171.tar.gz generated
- Maintenance mode disabled
- Install Nextcloud 14.0.4...
- Restore apps...
- * admin_notifications
- * bookmarks
- * bruteforcesettings
- * calendar
- * contacts
- * end_to_end_encryption
- * gpxpod
- * notes
- * previewgenerator
- * ransomware_protection
- * sensorlogger
- * tasks
- * twofactor_totp
- * unsplash
- Fix permissions...
- Upgrade...
- Nextcloud or one of the apps require upgrade - only a limited number of commands are available
- You may use your browser or the occ upgrade command to do the upgrade
- Set log level to debug
- Turned on maintenance mode
- Updating database schema
- Updated database
- Checking for update of app accessibility in appstore
- Checked for update of app "accessibility" in appstore
- Checking for update of app activity in appstore
- Checked for update of app "activity" in appstore
- Checking for update of app bookmarks in appstore
- Update app bookmarks from appstore
- Checked for update of app "bookmarks" in appstore
- Checking for update of app bruteforcesettings in appstore
- Update app bruteforcesettings from appstore
- Checked for update of app "bruteforcesettings" in appstore
- Checking for update of app calendar in appstore
- Update app calendar from appstore
- Checked for update of app "calendar" in appstore
- Checking for update of app cloud_federation_api in appstore
- Checked for update of app "cloud_federation_api" in appstore
- Checking for update of app contacts in appstore
- Update app contacts from appstore
- Checked for update of app "contacts" in appstore
- Checking for update of app dav in appstore
- Checked for update of app "dav" in appstore
- Checking for update of app federatedfilesharing in appstore
- Checked for update of app "federatedfilesharing" in appstore
- Checking for update of app files in appstore
- Checked for update of app "files" in appstore
- Checking for update of app files_pdfviewer in appstore
- Checked for update of app "files_pdfviewer" in appstore
- Checking for update of app files_sharing in appstore
- Checked for update of app "files_sharing" in appstore
- Checking for update of app files_texteditor in appstore
- Checked for update of app "files_texteditor" in appstore
- Checking for update of app files_trashbin in appstore
- Checked for update of app "files_trashbin" in appstore
- Checking for update of app files_versions in appstore
- Checked for update of app "files_versions" in appstore
- Checking for update of app files_videoplayer in appstore
- Checked for update of app "files_videoplayer" in appstore
- Checking for update of app firstrunwizard in appstore
- Checked for update of app "firstrunwizard" in appstore
- Checking for update of app gallery in appstore
- Checked for update of app "gallery" in appstore
- Checking for update of app logreader in appstore
- Checked for update of app "logreader" in appstore
- Checking for update of app lookup_server_connector in appstore
- Checked for update of app "lookup_server_connector" in appstore
- Checking for update of app nextcloud_announcements in appstore
- Checked for update of app "nextcloud_announcements" in appstore
- Checking for update of app notes in appstore
- Update app notes from appstore
- Checked for update of app "notes" in appstore
- Checking for update of app notifications in appstore
- Checked for update of app "notifications" in appstore
- Checking for update of app oauth2 in appstore
- Checked for update of app "oauth2" in appstore
- Checking for update of app password_policy in appstore
- Checked for update of app "password_policy" in appstore
- Checking for update of app previewgenerator in appstore
- Checked for update of app "previewgenerator" in appstore
- Checking for update of app provisioning_api in appstore
- Checked for update of app "provisioning_api" in appstore
- Checking for update of app sensorlogger in appstore
- Checked for update of app "sensorlogger" in appstore
- Checking for update of app serverinfo in appstore
- Checked for update of app "serverinfo" in appstore
- Checking for update of app sharebymail in appstore
- Checked for update of app "sharebymail" in appstore
- Checking for update of app support in appstore
- Checked for update of app "support" in appstore
- Checking for update of app tasks in appstore
- Update app tasks from appstore
- Checked for update of app "tasks" in appstore
- Checking for update of app theming in appstore
- Checked for update of app "theming" in appstore
- Checking for update of app twofactor_backupcodes in appstore
- Checked for update of app "twofactor_backupcodes" in appstore
- Checking for update of app unsplash in appstore
- Checked for update of app "unsplash" in appstore
- Checking for update of app updatenotification in appstore
- Checked for update of app "updatenotification" in appstore
- Checking for update of app workflowengine in appstore
- Checked for update of app "workflowengine" in appstore
- Starting code integrity check...
- Finished code integrity check
- Update successful
- Turned off maintenance mode
- Reset log level
- Check indices of the share table.
- Done.
- Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181126_1543210171-14.0.3.0.tar.gz
- Clean up...
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- System config value trusted_domains => 7 set to string nextcloudpi
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- Get:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease [15.0 kB]
- Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Get:4 http://raspbian.raspberrypi.org/raspbian stretch/main armhf Packages [11.7 MB]
- Fetched 11.7 MB in 10s (1093 kB/s)
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- The following packages will be upgraded:
- libgs9 libgs9-common
- 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Need to get 7003 kB of archives.
- After this operation, 28.7 kB of additional disk space will be used.
- Get:1 http://ftp.gwdg.de/pub/linux/debian/raspbian/raspbian stretch/main armhf libgs9 armhf 9.26~dfsg-0+deb9u1 [1863 kB]
- Get:2 http://ftp.gwdg.de/pub/linux/debian/raspbian/raspbian stretch/main armhf libgs9-common all 9.26~dfsg-0+deb9u1 [5140 kB]
- apt-listchanges: Reading changelogs...
- Fetched 7003 kB in 2s (2633 kB/s)
- (Reading database ...
- (Reading database ... 5%
- (Reading database ... 10%
- (Reading database ... 15%
- (Reading database ... 20%
- (Reading database ... 25%
- (Reading database ... 30%
- (Reading database ... 35%
- (Reading database ... 40%
- (Reading database ... 45%
- (Reading database ... 50%
- (Reading database ... 55%
- (Reading database ... 60%
- (Reading database ... 65%
- (Reading database ... 70%
- (Reading database ... 75%
- (Reading database ... 80%
- (Reading database ... 85%
- (Reading database ... 90%
- (Reading database ... 95%
- (Reading database ... 100%
- (Reading database ... 87081 files and directories currently installed.)
- Preparing to unpack .../libgs9_9.26~dfsg-0+deb9u1_armhf.deb ...
- Unpacking libgs9:armhf (9.26~dfsg-0+deb9u1) over (9.25~dfsg-0+deb9u1) ...
- Preparing to unpack .../libgs9-common_9.26~dfsg-0+deb9u1_all.deb ...
- Unpacking libgs9-common (9.26~dfsg-0+deb9u1) over (9.25~dfsg-0+deb9u1) ...
- Setting up libgs9-common (9.26~dfsg-0+deb9u1) ...
- Processing triggers for libc-bin (2.27-6) ...
- Setting up libgs9:armhf (9.26~dfsg-0+deb9u1) ...
- Processing triggers for libc-bin (2.27-6) ...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- System config value trusted_domains => 7 set to string nextcloudpi
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-backup ]
- check free space...
- clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181115_1542247201.tar
- Maintenance mode enabled
- backup database...
- backup base files...
- backup data files...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-nextcloud ]
- Downloading Nextcloud 13.0.5...
- Installing Nextcloud 13.0.5...
- Creating possible missing Directories
- chmod Files and Directories
- chown Directories
- chmod/chown .htaccess
- Setting up database...
- Setting up Apache...
- Site nextcloud already enabled
- Setting up system...
- Don't forget to run nc-init
- [ nc-update-nextcloud ]
- grep: nextcloud/config/config.php: No such file or directory
- Nextcloud data directory not found
- [ nc-update-nextcloud ]
- grep: nextcloud/config/config.php: No such file or directory
- Nextcloud data directory not found
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Nextcloud is not installed - only a limited number of commands are available
- [Symfony\Component\Console\Exception\CommandNotFoundException]
- There are no commands defined in the "config:system" namespace.
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-update-nextcloud ]
- Nextcloud data directory not found
- [ nc-init ]
- Setting up a clean Nextcloud instance... wait until message 'NC init done'
- Setting up database...
- Setting up Nextcloud...
- Nextcloud is not installed - only a limited number of commands are available
- Nextcloud was successfully installed
- Set mode for background jobs to 'cron'
- System config value mysql.utf8mb4 set to boolean true
- System config value trusted_domains => 1 set to string 192.168.0.3
- System config value trusted_domains => 5 set to string nextcloudpi.local
- System config value trusted_domains => 7 set to string nextcloudpi
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- System config value mail_smtpmode set to string sendmail
- System config value mail_smtpauthtype set to string LOGIN
- System config value mail_from_address set to string admin
- System config value mail_domain set to string ownyourbits.com
- calendar installed
- contacts installed
- notes installed
- tasks installed
- news installed
- admin_notifications installed
- previewgenerator installed
- calendar enabled
- contacts enabled
- notes enabled
- tasks enabled
- news enabled
- admin_notifications enabled
- previewgenerator enabled
- System config value overwriteprotocol set to string https
- NC init done
- [ nc-update-nextcloud ]
- Current Nextcloud version 13.0.5.2
- Available Nextcloud version 13.0.5
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- System config value trusted_domains => 7 set to string nextcloudpi
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- System config value overwrite.cli.url set to string http://localhost/
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:3 https://packages.sury.org/php stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543519341.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-restore ]
- /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891_2.tar not found
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 13.0.5.2
- Available Nextcloud version 14.0.4
- Download Nextcloud 14.0.4...
- Back up current instance...
- Nextcloud is in maintenance mode - no apps have been loaded
- check free space...
- Nextcloud is in maintenance mode - no apps have been loaded
- Maintenance mode enabled
- backup database...
- backup base files...
- compressing backup file...
- backup /var/www//nextcloud-bkp_20181130_1543555524.tar.gz generated
- Nextcloud is in maintenance mode - no apps have been loaded
- Maintenance mode disabled
- Install Nextcloud 14.0.4...
- Restore apps...
- * admin_notifications
- * calendar
- * contacts
- * news
- * notes
- * previewgenerator
- * tasks
- Restore data...
- Fix permissions...
- Upgrade...
- Nextcloud or one of the apps require upgrade - only a limited number of commands are available
- You may use your browser or the occ upgrade command to do the upgrade
- Set log level to debug
- Turned on maintenance mode
- Updating database schema
- Updated database
- Disabled incompatible app: admin_notifications
- Updating <federatedfilesharing> ...
- Updated <federatedfilesharing> to 1.4.0
- Updating <files_texteditor> ...
- Updated <files_texteditor> to 2.6.0
- Updating <files_videoplayer> ...
- Updated <files_videoplayer> to 1.3.0
- Updating <gallery> ...
- Updated <gallery> to 18.1.0
- Updating <password_policy> ...
- Updated <password_policy> to 1.4.0
- Updating <provisioning_api> ...
- Updated <provisioning_api> to 1.4.0
- Updating <serverinfo> ...
- Updated <serverinfo> to 1.4.0
- Updating <survey_client> ...
- Updated <survey_client> to 1.2.0
- Updating <twofactor_backupcodes> ...
- Updated <twofactor_backupcodes> to 1.3.1
- Updating <updatenotification> ...
- Updated <updatenotification> to 1.4.1
- Updating <federation> ...
- Updated <federation> to 1.4.0
- Updating <lookup_server_connector> ...
- Updated <lookup_server_connector> to 1.2.0
- Updating <oauth2> ...
- Updated <oauth2> to 1.2.1
- Updating <files> ...
- Updated <files> to 1.9.0
- Updating <activity> ...
- Updated <activity> to 2.7.0
- Updating <dav> ...
- Fix broken values of calendar objects
- Starting ...
- 0/0 [>---------------------------] 0%
- Updated <dav> to 1.6.0
- Updating <files_sharing> ...
- Updated <files_sharing> to 1.6.2
- Updating <files_trashbin> ...
- Updated <files_trashbin> to 1.4.1
- Updating <files_versions> ...
- Updated <files_versions> to 1.7.1
- Updating <sharebymail> ...
- Updated <sharebymail> to 1.4.0
- Updating <workflowengine> ...
- Updated <workflowengine> to 1.4.0
- Updating <comments> ...
- Updated <comments> to 1.4.0
- Updating <firstrunwizard> ...
- Updated <firstrunwizard> to 2.3.0
- Updating <nextcloud_announcements> ...
- Updated <nextcloud_announcements> to 1.3.0
- Updating <notifications> ...
- Updated <notifications> to 2.2.1
- Updating <systemtags> ...
- Updated <systemtags> to 1.4.0
- Updating <theming> ...
- Updated <theming> to 1.5.0
- Checking for update of app activity in appstore
- Checked for update of app "activity" in appstore
- Checking for update of app calendar in appstore
- Update app calendar from appstore
- Checked for update of app "calendar" in appstore
- Checking for update of app cloud_federation_api in appstore
- Checked for update of app "cloud_federation_api" in appstore
- Checking for update of app comments in appstore
- Checked for update of app "comments" in appstore
- Checking for update of app contacts in appstore
- Update app contacts from appstore
- Checked for update of app "contacts" in appstore
- Checking for update of app dav in appstore
- Checked for update of app "dav" in appstore
- Checking for update of app federatedfilesharing in appstore
- Checked for update of app "federatedfilesharing" in appstore
- Checking for update of app federation in appstore
- Checked for update of app "federation" in appstore
- Checking for update of app files in appstore
- Checked for update of app "files" in appstore
- Checking for update of app files_sharing in appstore
- Checked for update of app "files_sharing" in appstore
- Checking for update of app files_texteditor in appstore
- Checked for update of app "files_texteditor" in appstore
- Checking for update of app files_trashbin in appstore
- Checked for update of app "files_trashbin" in appstore
- Checking for update of app files_versions in appstore
- Checked for update of app "files_versions" in appstore
- Checking for update of app files_videoplayer in appstore
- Checked for update of app "files_videoplayer" in appstore
- Checking for update of app firstrunwizard in appstore
- Checked for update of app "firstrunwizard" in appstore
- Checking for update of app gallery in appstore
- Checked for update of app "gallery" in appstore
- Checking for update of app logreader in appstore
- Checked for update of app "logreader" in appstore
- Checking for update of app lookup_server_connector in appstore
- Checked for update of app "lookup_server_connector" in appstore
- Checking for update of app news in appstore
- Update app news from appstore
- Checked for update of app "news" in appstore
- Checking for update of app nextcloud_announcements in appstore
- Checked for update of app "nextcloud_announcements" in appstore
- Checking for update of app notes in appstore
- Checked for update of app "notes" in appstore
- Checking for update of app notifications in appstore
- Checked for update of app "notifications" in appstore
- Checking for update of app oauth2 in appstore
- Checked for update of app "oauth2" in appstore
- Checking for update of app password_policy in appstore
- Checked for update of app "password_policy" in appstore
- Checking for update of app previewgenerator in appstore
- Update app previewgenerator from appstore
- Checked for update of app "previewgenerator" in appstore
- Checking for update of app provisioning_api in appstore
- Checked for update of app "provisioning_api" in appstore
- Checking for update of app serverinfo in appstore
- Checked for update of app "serverinfo" in appstore
- Checking for update of app sharebymail in appstore
- Checked for update of app "sharebymail" in appstore
- Checking for update of app survey_client in appstore
- Checked for update of app "survey_client" in appstore
- Checking for update of app systemtags in appstore
- Checked for update of app "systemtags" in appstore
- Checking for update of app tasks in appstore
- Checked for update of app "tasks" in appstore
- Checking for update of app theming in appstore
- Checked for update of app "theming" in appstore
- Checking for update of app twofactor_backupcodes in appstore
- Checked for update of app "twofactor_backupcodes" in appstore
- Checking for update of app updatenotification in appstore
- Checked for update of app "updatenotification" in appstore
- Checking for update of app workflowengine in appstore
- Checked for update of app "workflowengine" in appstore
- Starting code integrity check...
- Finished code integrity check
- Update successful
- Turned off maintenance mode
- Reset log level
- Check indices of the share table.
- Adding additional mtime index to the filecache table, this can take some time...
- Filecache table updated successfully.
- Backup stored at /var/www/nextcloud/data/ncp-update-backups/nextcloud-bkp_20181130_1543555524-13.0.5.2.tar.gz
- Clean up...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ DDNS_no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- noip DDNS enabled
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert not yet due for renewal
- Keeping the existing certificate
- -------------------------------------------------------------------------------
- Certificate not yet due for renewal; no action taken.
- -------------------------------------------------------------------------------
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-autoupdate-ncp ]
- automatic NextCloudPi updates enabled
- [ nc-hdd-monitor ]
- /dev/sda: Unknown USB bridge [0x1058:0x259c (0x1005)]
- Please specify device type with the -d option.
- Use smartctl -h to get a usage summary
- Created symlink /etc/systemd/system/multi-user.target.wants/smartd.service → /lib/systemd/system/smartd.service.
- HDD monitor enabled
- [ nc-httpsonly ]
- Forcing HTTPS On
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing DDNS_spDYN
- Installing nc-backup
- Installing nc-restore
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value trusted_domains => 7 set to string nextcloudpi
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value trusted_domains => 8 set to string nextcloudpi.lan
- Nextcloud is in maintenance mode - no apps have been loaded
- Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
- Get:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease [15.0 kB]
- Hit:3 https://packages.sury.org/php stretch InRelease
- Fetched 15.0 kB in 1s (10.1 kB/s)
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- apt-transport-https is already the newest version (1.4.8).
- gnupg is already the newest version (2.1.18-8~deb9u3).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Warning: apt-key output should not be parsed (stdout is not a terminal)
- OK
- Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
- Hit:2 https://packages.sury.org/php stretch InRelease
- Hit:3 http://archive.raspberrypi.org/debian stretch InRelease
- Reading package lists...
- Reading package lists...
- Building dependency tree...
- Reading state information...
- curl is already the newest version (7.52.1-5+deb9u8).
- debian-goodies is already the newest version (0.69.1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- rpi-update is already the newest version (20140705).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- Calculating upgrade...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.2
- [ nc-restore ]
- extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
- tar: Unexpected EOF in archive
- tar: Unexpected EOF in archive
- tar: Error is not recoverable: exiting now
- Cleanup...
- [ nc-update-nextcloud ]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-update-nextcloud ]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-datadir ]
- INFO: /media/USBdrive/ncdata is not empty. Creating backup /media/USBdrive/ncdata-12-01-18
- Maintenance mode enabled
- moving data dir from /var/www/nextcloud/data to /media/USBdrive/ncdata...
- BTRFS filesystem detected
- Create subvolume '/media/USBdrive/ncdata'
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value datadirectory set to string /media/USBdrive/ncdata
- Nextcloud is in maintenance mode - no apps have been loaded
- System config value logfile set to string /media/USBdrive/ncdata/nextcloud.log
- Maintenance mode disabled
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-datadir ]
- INFO: data already there
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ DDNS_no-ip ]
- Auto configuration for Linux client of no-ip.com.
- Only one host [mynextcloudpi.ddns.net] is registered to this account.
- It will be used.
- New configuration file '/usr/local/etc/no-ip2.conf' created.
- System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- noip DDNS enabled
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-backup ]
- check free space...
- clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181122_1542852140.tar
- Maintenance mode enabled
- backup database...
- backup base files...
- backup data files...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-scan-auto ]
- automatic scans enabled
- [ nc-backup ]
- Nextcloud is in maintenance mode - no apps have been loaded
- check free space...
- clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar
- Maintenance mode already enabled
- backup database...
- backup base files...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-export-ncp ]
- grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
- grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
- configuration exported to /media/USBdrive//ncp-config_20181208.tar
- [ nc-snapshot-auto ]
- Nextcloud is in maintenance mode - no apps have been loaded
- automatic snapshots enabled
- [ nc-snapshot ]
- Maintenance mode already enabled
- Nextcloud is in maintenance mode - no apps have been loaded
- Create a readonly snapshot of '/media/myCloudDrive/ncdata' in '/media/myCloudDrive/ncdata/../ncp-snapshots/manual_2018-12-08_161613'
- snapshot manual_2018-12-08_161613 generated
- Maintenance mode disabled
- [ nc-export-ncp ]
- grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
- grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
- configuration exported to /media/USBdrive//ncp-config_20181208.tar
- [ nc-snapshot ]
- Maintenance mode enabled
- Nextcloud is in maintenance mode - no apps have been loaded
- Create a readonly snapshot of '/media/myCloudDrive/ncdata' in '/media/myCloudDrive/ncdata/../ncp-snapshots/manual_2018-12-08_170937'
- snapshot manual_2018-12-08_170937 generated
- Maintenance mode disabled
- [ nc-backup-auto ]
- automatic backups enabled
- [ nc-backup ]
- check free space...
- Maintenance mode enabled
- backup database...
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert is due for renewal, auto-renewing...
- Renewing an existing certificate
- Performing the following challenges:
- http-01 challenge for mynextcloudpi.ddns.net
- Using the webroot path /var/www/nextcloud for all unmatched domains.
- Waiting for verification...
- Cleaning up challenges
- Failed authorization procedure. mynextcloudpi.ddns.net (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://mynextcloudpi.ddns.net/.well-known/acme-challenge/QtndvzqaJe7Pj5k16HwFxte19zOtfLdeIpL1NR_xRHY: Timeout during connect (likely firewall problem)
- IMPORTANT NOTES:
- - The following errors were reported by the server:
- Domain: mynextcloudpi.ddns.net
- Type: connection
- Detail: Fetching
- http://mynextcloudpi.ddns.net/.well-known/acme-challenge/QtndvzqaJe7Pj5k16HwFxte19zOtfLdeIpL1NR_xRHY:
- Timeout during connect (likely firewall problem)
- To fix these errors, please make sure that your domain name was
- entered correctly and the DNS A record(s) for that domain
- contain(s) the right IP address. Additionally, please check that
- your computer has a publicly routable IP address and that no
- firewalls are preventing the server from communicating with the
- client. If you're using the webroot plugin, you should also verify
- that you are serving files from the webroot path you provided.
- [ letsencrypt ]
- Saving debug log to /var/log/letsencrypt/letsencrypt.log
- Cert is due for renewal, auto-renewing...
- Renewing an existing certificate
- Performing the following challenges:
- http-01 challenge for mynextcloudpi.ddns.net
- Using the webroot path /var/www/nextcloud for all unmatched domains.
- Waiting for verification...
- Cleaning up challenges
- Generating key (2048 bits): /etc/letsencrypt/keys/0002_key-certbot.pem
- Creating CSR: /etc/letsencrypt/csr/0002_csr-certbot.pem
- IMPORTANT NOTES:
- - Congratulations! Your certificate and chain have been saved at
- /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
- cert will expire on 2019-03-29. To obtain a new or tweaked version
- of this certificate in the future, simply run certbot again. To
- non-interactively renew *all* of your certificates, run "certbot
- renew"
- - If you like Certbot, please consider supporting our work by:
- Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
- Donating to EFF: https://eff.org/donate-le
- System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
- System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing nc-backup
- Installing nc-restore
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.13-1+0~20181207100540.13+stretch~1.gbpf57305).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 12 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.11
- [ nc-update-nextcloud ]
- Current Nextcloud version 14.0.4.2
- Available Nextcloud version 15.0.0
- Download Nextcloud 15.0.0...
- Back up current instance...
- check free space...
- Maintenance mode enabled
- backup database...
- backup base files...
- compressing backup file...
- backup /var/www//nextcloud-bkp_20181229_1546115116.tar.gz generated
- Maintenance mode disabled
- Install Nextcloud 15.0.0...
- Restore apps...
- * admin_notifications
- * bruteforcesettings
- * calendar
- * contacts
- * files_antivirus
- * fulltextsearch
- * gpxedit
- * news
- * notes
- * previewgenerator
- * ransomware_protection
- * tasks
- * unsplash
- Fix permissions...
- Upgrade...
- Nextcloud or one of the apps require upgrade - only a limited number of commands are available
- You may use your browser or the occ upgrade command to do the upgrade
- Set log level to debug
- Turned on maintenance mode
- Updating database schema
- Updated database
- Updating <accessibility> ...
- Updated <accessibility> to 1.1.0
- Updating <federatedfilesharing> ...
- Updated <federatedfilesharing> to 1.5.0
- Updating <files_pdfviewer> ...
- Updated <files_pdfviewer> to 1.4.0
- Updating <files_texteditor> ...
- Updated <files_texteditor> to 2.7.0
- Updating <files_videoplayer> ...
- Updated <files_videoplayer> to 1.4.0
- Updating <gallery> ...
- Updated <gallery> to 18.2.0
- Updating <password_policy> ...
- Updated <password_policy> to 1.5.0
- Updating <provisioning_api> ...
- Updated <provisioning_api> to 1.5.0
- Updating <serverinfo> ...
- Updated <serverinfo> to 1.5.0
- Updating <twofactor_backupcodes> ...
- Updated <twofactor_backupcodes> to 1.4.1
- Updating <updatenotification> ...
- Updated <updatenotification> to 1.5.0
- Updating <lookup_server_connector> ...
- Updated <lookup_server_connector> to 1.3.0
- Updating <oauth2> ...
- Updated <oauth2> to 1.3.0
- Updating <files> ...
- Updated <files> to 1.10.0
- Updating <activity> ...
- Updated <activity> to 2.8.2
- Updating <cloud_federation_api> ...
- Updated <cloud_federation_api> to 0.1.0
- Updating <dav> ...
- Fix broken values of calendar objects
- Starting ...
- 0/0 [>---------------------------] 0%
- Updated <dav> to 1.8.0
- Updating <files_sharing> ...
- Updated <files_sharing> to 1.7.0
- Updating <files_trashbin> ...
- Updated <files_trashbin> to 1.5.0
- Updating <files_versions> ...
- Updated <files_versions> to 1.8.0
- Updating <sharebymail> ...
- Updated <sharebymail> to 1.5.0
- Updating <workflowengine> ...
- Updated <workflowengine> to 1.5.0
- Updating <firstrunwizard> ...
- Updated <firstrunwizard> to 2.4.0
- Updating <nextcloud_announcements> ...
- Updated <nextcloud_announcements> to 1.4.0
- Updating <notifications> ...
- Updated <notifications> to 2.3.0
- Updating <theming> ...
- Updated <theming> to 1.6.0
- Checking for update of app accessibility in appstore
- Checked for update of app "accessibility" in appstore
- Checking for update of app activity in appstore
- Checked for update of app "activity" in appstore
- Checking for update of app bruteforcesettings in appstore
- Update app bruteforcesettings from appstore
- Checked for update of app "bruteforcesettings" in appstore
- Checking for update of app calendar in appstore
- Checked for update of app "calendar" in appstore
- Checking for update of app cloud_federation_api in appstore
- Checked for update of app "cloud_federation_api" in appstore
- Checking for update of app contacts in appstore
- Update app contacts from appstore
- Checked for update of app "contacts" in appstore
- Checking for update of app dav in appstore
- Checked for update of app "dav" in appstore
- Checking for update of app federatedfilesharing in appstore
- Checked for update of app "federatedfilesharing" in appstore
- Checking for update of app files in appstore
- Checked for update of app "files" in appstore
- Checking for update of app files_pdfviewer in appstore
- Checked for update of app "files_pdfviewer" in appstore
- Checking for update of app files_sharing in appstore
- Checked for update of app "files_sharing" in appstore
- Checking for update of app files_texteditor in appstore
- Checked for update of app "files_texteditor" in appstore
- Checking for update of app files_trashbin in appstore
- Checked for update of app "files_trashbin" in appstore
- Checking for update of app files_versions in appstore
- Checked for update of app "files_versions" in appstore
- Checking for update of app files_videoplayer in appstore
- Checked for update of app "files_videoplayer" in appstore
- Checking for update of app firstrunwizard in appstore
- Checked for update of app "firstrunwizard" in appstore
- Checking for update of app gallery in appstore
- Checked for update of app "gallery" in appstore
- Checking for update of app logreader in appstore
- Checked for update of app "logreader" in appstore
- Checking for update of app lookup_server_connector in appstore
- Checked for update of app "lookup_server_connector" in appstore
- Checking for update of app nextcloud_announcements in appstore
- Checked for update of app "nextcloud_announcements" in appstore
- Checking for update of app notes in appstore
- Checked for update of app "notes" in appstore
- Checking for update of app notifications in appstore
- Checked for update of app "notifications" in appstore
- Checking for update of app oauth2 in appstore
- Checked for update of app "oauth2" in appstore
- Checking for update of app password_policy in appstore
- Checked for update of app "password_policy" in appstore
- Checking for update of app previewgenerator in appstore
- Checked for update of app "previewgenerator" in appstore
- Checking for update of app provisioning_api in appstore
- Checked for update of app "provisioning_api" in appstore
- Checking for update of app serverinfo in appstore
- Checked for update of app "serverinfo" in appstore
- Checking for update of app sharebymail in appstore
- Checked for update of app "sharebymail" in appstore
- Checking for update of app support in appstore
- Checked for update of app "support" in appstore
- Checking for update of app tasks in appstore
- Checked for update of app "tasks" in appstore
- Checking for update of app theming in appstore
- Checked for update of app "theming" in appstore
- Checking for update of app twofactor_backupcodes in appstore
- Checked for update of app "twofactor_backupcodes" in appstore
- Checking for update of app unsplash in appstore
- Checked for update of app "unsplash" in appstore
- Checking for update of app updatenotification in appstore
- Checked for update of app "updatenotification" in appstore
- Checking for update of app workflowengine in appstore
- Checked for update of app "workflowengine" in appstore
- Starting code integrity check...
- Finished code integrity check
- Update successful
- Turned off maintenance mode
- Reset log level
- Check indices of the share table.
- Adding additional owner index to the share table, this can take some time...
- Share table updated successfully.
- Adding additional initiator index to the share table, this can take some time...
- Share table updated successfully.
- Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181229_1546115116-14.0.4.2.tar.gz
- Clean up...
- [ncp-update-nc]
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ nc-limits ]
- Using 729176064B for PHP
- Using 4 PHP threads
- Using 729176064B for Redis
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 14.0.4
- Nothing to update
- [ncp-update-nc]
- Nextcloud is in maintenance mode - no apps have been loaded
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 14.0.4
- Nothing to update
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ nc-update ]
- Downloading updates
- Performing updates
- Installing nc-backup
- Installing nc-restore
- Reading package lists...
- Building dependency tree...
- Reading state information...
- php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
- php7.2-common is already the newest version (7.2.13-1+0~20181207100540.13+stretch~1.gbpf57305).
- imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
- 0 upgraded, 0 newly installed, 0 to remove and 12 not upgraded.
- Activating nc-autoupdate-nc
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- automatic Nextcloud updates enabled
- NextCloudPi updated to version v0.67.11
- [ nc-update-nextcloud ]
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 15.0.0
- Nothing to update
- [ nc-autoupdate-ncp ]
- automatic NextCloudPi updates enabled
- [ nc-autoupdate-nc ]
- automatic Nextcloud updates enabled
- [ncp-update-nc]
- Current Nextcloud version 15.0.0.10
- Available Nextcloud version 14.0.4
- Nothing to update
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement