Advertisement
Guest User

ncp.log

a guest
Jan 9th, 2019
824
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 423.25 KB | None | 0 0
  1. [ nc-nextcloud ]
  2. Downloading Nextcloud 13.0.5...
  3. Installing Nextcloud 13.0.5...
  4. Creating possible missing Directories
  5. chmod Files and Directories
  6. chown Directories
  7. chmod/chown .htaccess
  8. Setting up database...
  9. Setting up Apache...
  10. Enabling site nextcloud.
  11. To activate the new configuration, you need to run:
  12. systemctl reload apache2
  13. Setting up system...
  14. Don't forget to run nc-init
  15.  
  16. [ nc-httpsonly ]
  17. Forcing HTTPS On
  18.  
  19. [ nc-notify-updates ]
  20. update web notifications enabled
  21.  
  22. [ unattended-upgrades ]
  23. Unattended upgrades active: yes (autoreboot yes)
  24.  
  25. [ nc-init ]
  26. Setting up a clean Nextcloud instance... wait until message 'NC init done'
  27. Setting up database...
  28. Setting up Nextcloud...
  29. Nextcloud is not installed - only a limited number of commands are available
  30. Nextcloud was successfully installed
  31. Set mode for background jobs to 'cron'
  32. System config value mysql.utf8mb4 set to boolean true
  33. System config value trusted_domains => 1 set to string 192.168.0.199
  34. System config value trusted_domains => 5 set to string nextcloudpi.local
  35. System config value mail_smtpmode set to string php
  36. System config value mail_smtpauthtype set to string LOGIN
  37. System config value mail_from_address set to string admin
  38. System config value mail_domain set to string ownyourbits.com
  39. calendar installed
  40. contacts installed
  41. notes installed
  42. tasks installed
  43. news installed
  44. admin_notifications installed
  45. calendar enabled
  46. contacts enabled
  47. notes enabled
  48. tasks enabled
  49. news enabled
  50. admin_notifications enabled
  51. System config value overwriteprotocol set to string https
  52. NC init done
  53.  
  54. [ fail2ban ]
  55. System config value loglevel set to string 2
  56. System config value log_type set to string file
  57. fail2ban enabled
  58.  
  59. [ spDYN ]
  60. [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
  61.  
  62. [ nc-admin ]
  63. Successfully reset password for ncp
  64.  
  65. [ nc-passwd ]
  66. password updated successfully
  67. Enabling site ncp.
  68. Enabling site nextcloud.
  69. To activate the new configuration, you need to run:
  70. systemctl reload apache2
  71. Site ncp-activation disabled.
  72. To activate the new configuration, you need to run:
  73. systemctl reload apache2
  74.  
  75. [ nc-automount ]
  76. Created symlink /etc/systemd/system/multi-user.target.wants/nc-automount.service → /usr/lib/systemd/system/nc-automount.service.
  77. Created symlink /etc/systemd/system/multi-user.target.wants/nc-automount-links.service → /usr/lib/systemd/system/nc-automount-links.service.
  78. automount enabled
  79.  
  80. [ nc-format-USB ]
  81. /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
  82. /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
  83. /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
  84. Error: Partition(s) 1 on /dev/sda have been written, but we have been unable to inform the kernel of the change, probably because it/they are in use. As a result, the old partition(s) will remain in use. You should reboot now before making further changes.
  85.  
  86. [ nc-format-USB ]
  87. /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
  88. /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
  89. /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
  90. Error: Partition(s) 1 on /dev/sda have been written, but we have been unable to inform the kernel of the change, probably because it/they are in use. As a result, the old partition(s) will remain in use. You should reboot now before making further changes.
  91.  
  92. [ nc-limits ]
  93. Using 729179136B for PHP
  94. Using 4 PHP threads
  95. Using 729179136B for Redis
  96.  
  97. [ nc-automount ]
  98. automount enabled
  99.  
  100. [ nc-format-USB ]
  101. /dev/sda: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
  102. /dev/sda: 8 bytes were erased at offset 0x491e1ffe00 (gpt): 45 46 49 20 50 41 52 54
  103. /dev/sda: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
  104. Drive sda formatted successfuly and labeled myCloudDrive
  105.  
  106. [ nc-datadir ]
  107. Maintenance mode enabled
  108. moving data dir from /var/www/nextcloud/data to /media/USBdrive/ncdata...
  109. BTRFS filesystem detected
  110. Create subvolume '/media/USBdrive/ncdata'
  111. Nextcloud is in maintenance mode - no apps have been loaded
  112.  
  113. System config value datadirectory set to string /media/USBdrive/ncdata
  114. Nextcloud is in maintenance mode - no apps have been loaded
  115.  
  116. System config value logfile set to string /media/USBdrive/ncdata/nextcloud.log
  117. Nextcloud is in maintenance mode - no apps have been loaded
  118.  
  119. Maintenance mode disabled
  120.  
  121. [ fail2ban ]
  122. System config value loglevel set to string 2
  123. System config value log_type set to string file
  124. fail2ban enabled
  125.  
  126. [ nc-forward-ports ]
  127. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  128. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  129. for more information.
  130. List of UPNP devices found on the network :
  131. desc: http://192.168.0.227:7678/nservice/
  132. st: upnp:rootdevice
  133.  
  134. UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
  135. Trying to continue anyway
  136. Local LAN ip address : 192.168.0.199
  137. UPNP_DeletePortMapping() returned : 402
  138. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  139. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  140. for more information.
  141. List of UPNP devices found on the network :
  142. desc: http://192.168.0.227:9119/screen_sharing
  143. st: upnp:rootdevice
  144.  
  145. UPnP device found. Is it an IGD ? : http://192.168.0.227:9119/
  146. Trying to continue anyway
  147. Local LAN ip address : 192.168.0.199
  148. UPNP_DeletePortMapping() returned : 402
  149. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  150. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  151. for more information.
  152. List of UPNP devices found on the network :
  153. desc: http://192.168.0.227:7678/nservice/
  154. st: upnp:rootdevice
  155.  
  156. UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
  157. Trying to continue anyway
  158. Local LAN ip address : 192.168.0.199
  159. GetExternalIPAddress failed.
  160. AddPortMapping(443, 443, 192.168.0.199) failed with code 402 (Invalid Args)
  161. GetSpecificPortMappingEntry() failed with code 402 (Invalid Args)
  162.  
  163. Could not forward ports automatically.
  164. Do it manually, or activate UPnP in your router and try again
  165.  
  166. [ nc-forward-ports ]
  167. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  168. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  169. for more information.
  170. List of UPNP devices found on the network :
  171. desc: http://192.168.0.1:5000/rootDesc.xml
  172. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  173.  
  174. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  175. Trying to continue anyway
  176. Local LAN ip address : 192.168.0.199
  177. UPNP_DeletePortMapping() returned : 0
  178. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  179. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  180. for more information.
  181. List of UPNP devices found on the network :
  182. desc: http://192.168.0.1:5000/rootDesc.xml
  183. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  184.  
  185. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  186. Trying to continue anyway
  187. Local LAN ip address : 192.168.0.199
  188. UPNP_DeletePortMapping() returned : 0
  189. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  190. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  191. for more information.
  192. List of UPNP devices found on the network :
  193. desc: http://192.168.0.1:5000/rootDesc.xml
  194. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  195.  
  196. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  197. Trying to continue anyway
  198. Local LAN ip address : 192.168.0.199
  199. ExternalIPAddress = 0.0.0.0
  200. InternalIP:Port = 192.168.0.199:443
  201. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  202. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  203. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  204. for more information.
  205. List of UPNP devices found on the network :
  206. desc: http://192.168.0.1:5000/rootDesc.xml
  207. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  208.  
  209. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  210. Trying to continue anyway
  211. Local LAN ip address : 192.168.0.199
  212. ExternalIPAddress = 0.0.0.0
  213. InternalIP:Port = 192.168.0.199:80
  214. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  215.  
  216. [ nc-admin ]
  217. User does not exist
  218.  
  219. [ nc-autoupdate-nc ]
  220. automatic Nextcloud updates enabled
  221.  
  222. [ nc-autoupdate-ncp ]
  223. automatic NextCloudPi updates enabled
  224.  
  225. [ nc-backup-auto ]
  226. automatic backups enabled
  227.  
  228. [ nc-forward-ports ]
  229. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  230. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  231. for more information.
  232. List of UPNP devices found on the network :
  233. desc: http://192.168.0.1:5000/rootDesc.xml
  234. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  235.  
  236. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  237. Trying to continue anyway
  238. Local LAN ip address : 192.168.0.199
  239. UPNP_DeletePortMapping() returned : 0
  240. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  241. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  242. for more information.
  243. List of UPNP devices found on the network :
  244. desc: http://192.168.0.1:5000/rootDesc.xml
  245. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  246.  
  247. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  248. Trying to continue anyway
  249. Local LAN ip address : 192.168.0.199
  250. UPNP_DeletePortMapping() returned : 0
  251. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  252. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  253. for more information.
  254. List of UPNP devices found on the network :
  255. desc: http://192.168.0.1:5000/rootDesc.xml
  256. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  257.  
  258. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  259. Trying to continue anyway
  260. Local LAN ip address : 192.168.0.199
  261. ExternalIPAddress = 0.0.0.0
  262. InternalIP:Port = 192.168.0.199:443
  263. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  264. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  265. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  266. for more information.
  267. List of UPNP devices found on the network :
  268. desc: http://192.168.0.1:5000/rootDesc.xml
  269. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  270.  
  271. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  272. Trying to continue anyway
  273. Local LAN ip address : 192.168.0.199
  274. ExternalIPAddress = 0.0.0.0
  275. InternalIP:Port = 192.168.0.199:80
  276. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  277.  
  278. [ nc-swapfile ]
  279. BTRFS doesn't support swapfiles. You can still use nc-zram
  280.  
  281. [ nc-update ]
  282. Downloading updates
  283. Performing updates
  284. Installing nc-restore
  285. Activating nc-autoupdate-nc
  286. [ nc-autoupdate-nc ]
  287. automatic Nextcloud updates enabled
  288. automatic Nextcloud updates enabled
  289.  
  290. Installing nc-backup
  291. NextCloudPi updated to version v0.58.1
  292.  
  293. [ nc-webui ]
  294. Site ncp already enabled
  295. ncp-web enabled
  296.  
  297. [ nc-zram ]
  298. Created symlink /etc/systemd/system/sysinit.target.wants/zram.service → /etc/systemd/system/zram.service.
  299. ZRAM enabled
  300.  
  301. [ no-ip ]
  302.  
  303. Auto configuration for Linux client of no-ip.com.
  304.  
  305. You have entered an incorrect username
  306. -or-
  307. an incorrect password for this username.
  308.  
  309. [ no-ip ]
  310.  
  311. Auto configuration for Linux client of no-ip.com.
  312.  
  313. You have entered an incorrect username
  314. -or-
  315. an incorrect password for this username.
  316.  
  317. [ no-ip ]
  318.  
  319. Auto configuration for Linux client of no-ip.com.
  320.  
  321. You have entered an incorrect username
  322. -or-
  323. an incorrect password for this username.
  324.  
  325. [ no-ip ]
  326.  
  327. Auto configuration for Linux client of no-ip.com.
  328.  
  329. You have entered an incorrect username
  330. -or-
  331. an incorrect password for this username.
  332.  
  333. [ nc-forward-ports ]
  334. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  335. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  336. for more information.
  337. List of UPNP devices found on the network :
  338. desc: http://192.168.0.227:7678/nservice/
  339. st: upnp:rootdevice
  340.  
  341. UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
  342. Trying to continue anyway
  343. Local LAN ip address : 192.168.0.199
  344. UPNP_DeletePortMapping() returned : 402
  345. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  346. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  347. for more information.
  348. List of UPNP devices found on the network :
  349. desc: http://192.168.0.227:7678/nservice/
  350. st: upnp:rootdevice
  351.  
  352. UPnP device found. Is it an IGD ? : http://192.168.0.227:7678/
  353. Trying to continue anyway
  354. Local LAN ip address : 192.168.0.199
  355. UPNP_DeletePortMapping() returned : 402
  356. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  357. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  358. for more information.
  359. List of UPNP devices found on the network :
  360. desc: http://192.168.0.227:9119/screen_sharing
  361. st: upnp:rootdevice
  362.  
  363. UPnP device found. Is it an IGD ? : http://192.168.0.227:9119/
  364. Trying to continue anyway
  365. Local LAN ip address : 192.168.0.199
  366. GetExternalIPAddress failed.
  367. AddPortMapping(443, 443, 192.168.0.199) failed with code 402 (Invalid Args)
  368. GetSpecificPortMappingEntry() failed with code 402 (Invalid Args)
  369.  
  370. Could not forward ports automatically.
  371. Do it manually, or activate UPnP in your router and try again
  372.  
  373. [ spDYN ]
  374. [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
  375.  
  376. [ spDYN ]
  377. ... removing cronfile: /etc/cron.d/spdnsupdater
  378. spdnsUpdater is now disabled
  379.  
  380. [ no-ip ]
  381.  
  382. Auto configuration for Linux client of no-ip.com.
  383.  
  384. You have entered an incorrect username
  385. -or-
  386. an incorrect password for this username.
  387.  
  388. [ no-ip ]
  389.  
  390. Auto configuration for Linux client of no-ip.com.
  391.  
  392. You have entered an incorrect username
  393. -or-
  394. an incorrect password for this username.
  395.  
  396. [ nc-forward-ports ]
  397. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  398. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  399. for more information.
  400. List of UPNP devices found on the network :
  401. desc: http://192.168.0.1:5000/rootDesc.xml
  402. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  403.  
  404. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  405. Trying to continue anyway
  406. Local LAN ip address : 192.168.0.199
  407. UPNP_DeletePortMapping() returned : 0
  408. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  409. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  410. for more information.
  411. List of UPNP devices found on the network :
  412. desc: http://192.168.0.1:5000/rootDesc.xml
  413. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  414.  
  415. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  416. Trying to continue anyway
  417. Local LAN ip address : 192.168.0.199
  418. UPNP_DeletePortMapping() returned : 0
  419. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  420. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  421. for more information.
  422. List of UPNP devices found on the network :
  423. desc: http://192.168.0.1:5000/rootDesc.xml
  424. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  425.  
  426. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  427. Trying to continue anyway
  428. Local LAN ip address : 192.168.0.199
  429. ExternalIPAddress = 0.0.0.0
  430. InternalIP:Port = 192.168.0.199:443
  431. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  432. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  433. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  434. for more information.
  435. List of UPNP devices found on the network :
  436. desc: http://192.168.0.1:5000/rootDesc.xml
  437. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  438.  
  439. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  440. Trying to continue anyway
  441. Local LAN ip address : 192.168.0.199
  442. ExternalIPAddress = 0.0.0.0
  443. InternalIP:Port = 192.168.0.199:80
  444. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  445.  
  446. [ nc-forward-ports ]
  447. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  448. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  449. for more information.
  450. List of UPNP devices found on the network :
  451. desc: http://192.168.0.1:5000/rootDesc.xml
  452. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  453.  
  454. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  455. Trying to continue anyway
  456. Local LAN ip address : 192.168.0.199
  457. UPNP_DeletePortMapping() returned : 0
  458. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  459. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  460. for more information.
  461. List of UPNP devices found on the network :
  462. desc: http://192.168.0.1:5000/rootDesc.xml
  463. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  464.  
  465. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  466. Trying to continue anyway
  467. Local LAN ip address : 192.168.0.199
  468. UPNP_DeletePortMapping() returned : 0
  469. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  470. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  471. for more information.
  472. List of UPNP devices found on the network :
  473. desc: http://192.168.0.1:5000/rootDesc.xml
  474. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  475.  
  476. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  477. Trying to continue anyway
  478. Local LAN ip address : 192.168.0.199
  479. ExternalIPAddress = 0.0.0.0
  480. InternalIP:Port = 192.168.0.199:443
  481. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  482. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  483. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  484. for more information.
  485. List of UPNP devices found on the network :
  486. desc: http://192.168.0.1:5000/rootDesc.xml
  487. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  488.  
  489. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  490. Trying to continue anyway
  491. Local LAN ip address : 192.168.0.199
  492. ExternalIPAddress = 0.0.0.0
  493. InternalIP:Port = 192.168.0.199:80
  494. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  495.  
  496. [ nc-forward-ports ]
  497. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  498. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  499. for more information.
  500. List of UPNP devices found on the network :
  501. desc: http://192.168.0.1:5000/rootDesc.xml
  502. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  503.  
  504. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  505. Trying to continue anyway
  506. Local LAN ip address : 192.168.0.199
  507. UPNP_DeletePortMapping() returned : 0
  508. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  509. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  510. for more information.
  511. List of UPNP devices found on the network :
  512. desc: http://192.168.0.1:5000/rootDesc.xml
  513. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  514.  
  515. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  516. Trying to continue anyway
  517. Local LAN ip address : 192.168.0.199
  518. UPNP_DeletePortMapping() returned : 0
  519. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  520. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  521. for more information.
  522. List of UPNP devices found on the network :
  523. desc: http://192.168.0.1:5000/rootDesc.xml
  524. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  525.  
  526. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  527. Trying to continue anyway
  528. Local LAN ip address : 192.168.0.199
  529. ExternalIPAddress = 0.0.0.0
  530. InternalIP:Port = 192.168.0.199:443
  531. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  532. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  533. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  534. for more information.
  535. List of UPNP devices found on the network :
  536. desc: http://192.168.0.1:5000/rootDesc.xml
  537. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  538.  
  539. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  540. Trying to continue anyway
  541. Local LAN ip address : 192.168.0.199
  542. ExternalIPAddress = 0.0.0.0
  543. InternalIP:Port = 192.168.0.199:80
  544. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  545.  
  546. [ no-ip ]
  547.  
  548. Auto configuration for Linux client of no-ip.com.
  549.  
  550. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  551. It will be used.
  552.  
  553. New configuration file '/usr/local/etc/no-ip2.conf' created.
  554.  
  555. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  556. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  557. noip DDNS enabled
  558.  
  559. [ no-ip ]
  560.  
  561. Auto configuration for Linux client of no-ip.com.
  562.  
  563. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  564. It will be used.
  565.  
  566. New configuration file '/usr/local/etc/no-ip2.conf' created.
  567.  
  568. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  569. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  570. noip DDNS enabled
  571.  
  572. [ no-ip ]
  573.  
  574. Auto configuration for Linux client of no-ip.com.
  575.  
  576. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  577. It will be used.
  578.  
  579. New configuration file '/usr/local/etc/no-ip2.conf' created.
  580.  
  581. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  582. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  583. noip DDNS enabled
  584.  
  585. [ dnsmasq ]
  586. System config value trusted_domains => 2 set to string https://mynextcloudpi.ddns.net/
  587. System config value overwrite.cli.url set to string https://https://mynextcloudpi.ddns.net/
  588. dnsmasq enabled
  589.  
  590. [ letsencrypt ]
  591. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  592. Obtaining a new certificate
  593. An unexpected error occurred:
  594. The request message was malformed :: Error creating new authz :: Invalid character in DNS name
  595. Please see the logfiles in /var/log/letsencrypt for more details.
  596. IMPORTANT NOTES:
  597. - If you lose your account credentials, you can recover through
  598. e-mails sent to daniel@fam-klauck.de.
  599. - Your account credentials have been saved in your Certbot
  600. configuration directory at /etc/letsencrypt. You should make a
  601. secure backup of this folder now. This configuration directory will
  602. also contain certificates and private keys obtained by Certbot so
  603. making regular backups of this folder is ideal.
  604.  
  605. [ letsencrypt ]
  606. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  607. Obtaining a new certificate
  608. Performing the following challenges:
  609. http-01 challenge for mynextcloudpi.ddns.net
  610. Using the webroot path /var/www/nextcloud for all unmatched domains.
  611. Waiting for verification...
  612. Cleaning up challenges
  613. Generating key (2048 bits): /etc/letsencrypt/keys/0000_key-certbot.pem
  614. Creating CSR: /etc/letsencrypt/csr/0000_csr-certbot.pem
  615. IMPORTANT NOTES:
  616. - Congratulations! Your certificate and chain have been saved at
  617. /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
  618. cert will expire on 2018-10-31. To obtain a new or tweaked version
  619. of this certificate in the future, simply run certbot again. To
  620. non-interactively renew *all* of your certificates, run "certbot
  621. renew"
  622. - If you like Certbot, please consider supporting our work by:
  623.  
  624. Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
  625. Donating to EFF: https://eff.org/donate-le
  626.  
  627. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  628. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  629.  
  630. [ UFW ]
  631. Firewall is active and enabled on system startup
  632. Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
  633. Executing: /lib/systemd/systemd-sysv-install enable ufw
  634.  
  635. # web server rules
  636. Rule added
  637. Rule added (v6)
  638. Rule added
  639. Rule added (v6)
  640. Rule added
  641. Rule added (v6)
  642.  
  643. # SSH rules
  644. Rule added
  645. Rule added (v6)
  646.  
  647. # DNS rules
  648. Rule added
  649. Rule added (v6)
  650.  
  651. # SAMBA rules
  652. Rule added
  653. Rule added (v6)
  654.  
  655. # NFS rules
  656. Rule added
  657. Rule added (v6)
  658.  
  659. # UPnP rules
  660. Rule added
  661. UFW enabled
  662.  
  663. [ nc-audit ]
  664. General security audit
  665.  
  666. [ Lynis 2.4.0 ]
  667.  
  668. ################################################################################
  669. Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
  670. welcome to redistribute it under the terms of the GNU General Public License.
  671. See the LICENSE file for details about using this software.
  672.  
  673. 2007-2016, CISOfy - https://cisofy.com/lynis/
  674. Enterprise support available (compliance, plugins, interface and tools)
  675. ################################################################################
  676.  
  677.  
  678. [+] Initializing program
  679. ------------------------------------
  680. - Detecting OS...  [ DONE ]
  681. - Checking profiles... [ DONE ]
  682.  
  683. ---------------------------------------------------
  684. Program version: 2.4.0
  685. Operating system: Linux
  686. Operating system name: Debian
  687. Operating system version: 9.4
  688. Kernel version: 4.14.50
  689. Hardware platform: armv7l
  690. Hostname: nextcloudpi
  691. ---------------------------------------------------
  692. Profiles: /etc/lynis/default.prf /etc/lynis/ncp.prf
  693. Log file: /var/log/lynis.log
  694. Report file: /var/log/lynis-report.dat
  695. Report version: 1.0
  696. Plugin directory: /etc/lynis/plugins
  697. ---------------------------------------------------
  698. Auditor: [Not Specified]
  699. Test category: all
  700. Test group: all
  701. ---------------------------------------------------
  702. - Program update status...  [ WARNING ]
  703.  
  704. ===============================================================================
  705. Lynis update available
  706. ===============================================================================
  707.  
  708. Current version is more than 4 months old
  709.  
  710. Current version : 240 Latest version : 266
  711.  
  712. Please update to the latest version.
  713. New releases include additional features, bug fixes, tests and baselines.
  714.  
  715. Download the latest version:
  716. Packages (DEB/RPM) - https://packages.cisofy.com
  717. Website - https://cisofy.com/downloads/
  718. GitHub - https://github.com/CISOfy/lynis
  719.  
  720. ===============================================================================
  721.  
  722.  
  723. [+] System Tools
  724. ------------------------------------
  725. - Scanning available tools...
  726. - Checking system binaries...
  727.  
  728. [+] Plugins (phase 1)
  729. ------------------------------------
  730. Note: plugins have more extensive tests and may take several minutes to complete
  731.  
  732. - Plugin: debian
  733. [
  734. [+] Debian Tests
  735. ------------------------------------
  736. - Checking for system binaries that are required by Debian Tests...
  737. - Checking /bin...  [ FOUND ]
  738. - Checking /sbin...  [ FOUND ]
  739. - Checking /usr/bin...  [ FOUND ]
  740. - Checking /usr/sbin...  [ FOUND ]
  741. - Checking /usr/local/bin...  [ FOUND ]
  742. - Checking /usr/local/sbin...  [ FOUND ]
  743. - Authentication:
  744. - PAM (Pluggable Authentication Modules):
  745. - libpam-tmpdir [ Not Installed ]
  746. - libpam-usb [ Not Installed ]
  747. - File System Checks:
  748. - DM-Crypt, Cryptsetup & Cryptmount:
  749. - Software:
  750. - apt-listchanges [ Installed and enabled for apt ]
  751. - checkrestart [ Installed ]
  752. - needrestart [ Not Installed ]
  753. - debsecan [ Installed and enabled for cron ]
  754. - debsums [ Installed and enabled for cron ]
  755. - fail2ban [ Installed with jail.local ]
  756. ]
  757.  
  758. [+] Boot and services
  759. ------------------------------------
  760. - Service Manager [ systemd ]
  761. - Checking UEFI boot [ DISABLED ]
  762. - Boot loader [ NONE FOUND ]
  763. - Check running services (systemctl) [ DONE ]
  764. Result: found 31 running services
  765. - Check enabled services at boot (systemctl) [ DONE ]
  766. Result: found 47 enabled services
  767. - Check startup files (permissions) [ OK ]
  768.  
  769. [+] Kernel
  770. ------------------------------------
  771. - Checking default runlevel [ runlevel 5 ]
  772. - Checking kernel version and release [ DONE ]
  773. - Checking kernel type [ DONE ]
  774. - Checking loaded kernel modules [ DONE ]
  775. Found 64 active modules
  776. - Checking Linux kernel configuration file [ NOT FOUND ]
  777. - Checking core dumps configuration [ DISABLED ]
  778. - Checking setuid core dumps configuration [ DEFAULT ]
  779. - Check if reboot is needed [ UNKNOWN ]
  780.  
  781. [+] Memory and Processes
  782. ------------------------------------
  783. - Checking /proc/meminfo [ FOUND ]
  784. - Searching for dead/zombie processes [ OK ]
  785. - Searching for IO waiting processes [ OK ]
  786.  
  787. [+] Users, Groups and Authentication
  788. ------------------------------------
  789. - Administrator accounts [ OK ]
  790. - Unique UIDs [ OK ]
  791. - Consistency of group files (grpck) [ OK ]
  792. - Unique group IDs [ OK ]
  793. - Unique group names [ OK ]
  794. - Password file consistency [ OK ]
  795. - Query system users (non daemons) [ DONE ]
  796. - NIS+ authentication support [ NOT ENABLED ]
  797. - NIS authentication support [ NOT ENABLED ]
  798. - sudoers file [ FOUND ]
  799. - Check sudoers file permissions [ OK ]
  800. - PAM password strength tools [ SUGGESTION ]
  801. - PAM configuration files (pam.conf) [ FOUND ]
  802. - PAM configuration files (pam.d) [ FOUND ]
  803. - PAM modules [ NOT FOUND ]
  804. - LDAP module in PAM [ NOT FOUND ]
  805. - Accounts without expire date [ OK ]
  806. - Accounts without password [ OK ]
  807. - Checking user password aging (minimum) [ DISABLED ]
  808. - User password aging (maximum) [ DISABLED ]
  809. - Checking expired passwords [ OK ]
  810. - Checking Linux single user mode authentication [ OK ]
  811. - Determining default umask
  812. - umask (/etc/profile) [ NOT FOUND ]
  813. - umask (/etc/login.defs) [ SUGGESTION ]
  814. - LDAP authentication support [ NOT ENABLED ]
  815. - Logging failed login attempts [ ENABLED ]
  816.  
  817. [+] Shells
  818. ------------------------------------
  819. - Checking shells from /etc/shells
  820. Result: found 4 shells (valid shells: 4).
  821. - Session timeout settings/tools [ NONE ]
  822. - Checking default umask values
  823. - Checking default umask in /etc/bash.bashrc [ NONE ]
  824. - Checking default umask in /etc/profile [ NONE ]
  825.  
  826. [+] File systems
  827. ------------------------------------
  828. - Query swap partitions (fstab) [ NONE ]
  829. - Testing swap partitions [ OK ]
  830. - Testing /proc mount (hidepid) [ SUGGESTION ]
  831. - Checking for old files in /tmp [ OK ]
  832. - Checking /tmp sticky bit [ OK ]
  833. - ACL support root file system [ ENABLED ]
  834. - Mount options of / [ NON DEFAULT ]
  835. - Mount options of /boot [ NON DEFAULT ]
  836. - Disable kernel support of some filesystems
  837. - Discovered kernel modules: hfs hfsplus jffs2 squashfs udf 
  838.  
  839. [+] Storage
  840. ------------------------------------
  841. - Checking USB devices authorization [ ENABLED ]
  842.  
  843. [+] NFS
  844. ------------------------------------
  845. - Query rpc registered programs [ DONE ]
  846. - Query NFS versions [ DONE ]
  847. - Query NFS protocols [ DONE ]
  848. - Check running NFS daemon [ NOT FOUND ]
  849.  
  850. [+] Name services
  851. ------------------------------------
  852. - Checking default DNS search domain [ FOUND ]
  853. - Checking /etc/hosts
  854. - Checking /etc/hosts (duplicates) [ OK ]
  855. - Checking /etc/hosts (hostname) [ OK ]
  856. - Checking /etc/hosts (localhost) [ OK ]
  857.  
  858. [+] Ports and packages
  859. ------------------------------------
  860. - Searching package managers
  861. - Searching dpkg package manager [ FOUND ]
  862. - Querying package manager
  863. - Query unpurged packages [ FOUND ]
  864. - debsecan utility [ FOUND ]
  865. - debsecan cron job [ FOUND ]
  866. - debsums utility [ FOUND ]
  867. - Cron job for debsums [ FOUND ]
  868. - Checking vulnerable packages (apt-get only) [ DONE ]
  869. - Checking package audit tool [ INSTALLED ]
  870. Found: apt-get
  871.  
  872. [+] Networking
  873. ------------------------------------
  874. - Checking IPv6 configuration [ ENABLED ]
  875. Configuration method [ AUTO ]
  876. IPv6 only [ NO ]
  877. - Checking configured nameservers
  878. - Testing nameservers
  879. Nameserver: 127.0.0.1 [ OK ]
  880. - Checking default gateway [ DONE ]
  881. - Getting listening ports (TCP/UDP) [ DONE ]
  882. * Found 20 ports
  883. - Checking promiscuous interfaces [ OK ]
  884. - Checking waiting connections [ OK ]
  885. - Checking status DHCP client [ NOT ACTIVE ]
  886. - Checking for ARP monitoring software [ NOT FOUND ]
  887.  
  888. [+] Printers and Spools
  889. ------------------------------------
  890. - Checking cups daemon [ NOT FOUND ]
  891. - Checking lp daemon [ NOT RUNNING ]
  892.  
  893. [+] Software: e-mail and messaging
  894. ------------------------------------
  895. - Checking Exim status [ NOT FOUND ]
  896. - Checking Postfix status [ RUNNING ]
  897. - Checking Postfix configuration [ FOUND ]
  898. - Postfix banner [ WARNING ]
  899. - Checking Dovecot status [ NOT FOUND ]
  900. - Checking Qmail status [ NOT FOUND ]
  901. - Checking Sendmail status [ NOT FOUND ]
  902.  
  903. [+] Software: firewalls
  904. ------------------------------------
  905. - Checking iptables kernel module [ FOUND ]
  906. - Checking iptables policies of chains [ FOUND ]
  907. - Checking for empty ruleset [ OK ]
  908. - Checking host based firewall [ ACTIVE ]
  909.  
  910. [+] Software: webserver
  911. ------------------------------------
  912. - Checking Apache (binary /usr/sbin/apache2) [ FOUND ]
  913. Info: Found 3 virtual hosts
  914. * Loadable modules [ FOUND ]
  915. - Found 116 loadable modules
  916. ModSecurity: web application firewall [ FOUND ]
  917. - Checking nginx [ NOT FOUND ]
  918.  
  919. [+] SSH Support
  920. ------------------------------------
  921. - Checking running SSH daemon [ FOUND ]
  922. - Searching SSH configuration [ FOUND ]
  923. - SSH option: AllowTcpForwarding [ SUGGESTION ]
  924. - SSH option: ClientAliveCountMax [ SUGGESTION ]
  925. - SSH option: ClientAliveInterval [ OK ]
  926. - SSH option: Compression [ SUGGESTION ]
  927. - SSH option: FingerprintHash [ OK ]
  928. - SSH option: GatewayPorts [ OK ]
  929. - SSH option: IgnoreRhosts [ OK ]
  930. - SSH option: LoginGraceTime [ OK ]
  931. - SSH option: LogLevel [ SUGGESTION ]
  932. - SSH option: MaxAuthTries [ SUGGESTION ]
  933. - SSH option: MaxSessions [ SUGGESTION ]
  934. - SSH option: PermitRootLogin [ SUGGESTION ]
  935. - SSH option: PermitUserEnvironment [ OK ]
  936. - SSH option: PermitTunnel [ OK ]
  937. - SSH option: Port [ SUGGESTION ]
  938. - SSH option: PrintLastLog [ OK ]
  939. - SSH option: Protocol [ NOT FOUND ]
  940. - SSH option: StrictModes [ OK ]
  941. - SSH option: TCPKeepAlive [ SUGGESTION ]
  942. - SSH option: UseDNS [ OK ]
  943. - SSH option: UsePrivilegeSeparation [ OK ]
  944. - SSH option: VerifyReverseMapping [ NOT FOUND ]
  945. - SSH option: X11Forwarding [ SUGGESTION ]
  946. - SSH option: AllowAgentForwarding [ SUGGESTION ]
  947. - SSH option: AllowUsers [ NOT FOUND ]
  948. - SSH option: AllowGroups [ NOT FOUND ]
  949.  
  950. [+] SNMP Support
  951. ------------------------------------
  952. - Checking running SNMP daemon [ NOT FOUND ]
  953.  
  954. [+] Databases
  955. ------------------------------------
  956. - MySQL process status [ FOUND ]
  957. - Redis (server) status [ FOUND ]
  958. - Redis (requirepass configured) [ FOUND ]
  959. - Redis (rename of CONFIG command) [ FOUND ]
  960. - Redis (bind on localhost) [ FOUND ]
  961.  
  962. [+] LDAP Services
  963. ------------------------------------
  964. - Checking OpenLDAP instance [ NOT FOUND ]
  965.  
  966. [+] PHP
  967. ------------------------------------
  968. - Checking PHP [ NOT FOUND ]
  969.  
  970. [+] Squid Support
  971. ------------------------------------
  972. - Checking running Squid daemon [ NOT FOUND ]
  973.  
  974. [+] Logging and files
  975. ------------------------------------
  976. - Checking for a running log daemon [ OK ]
  977. - Checking Syslog-NG status [ NOT FOUND ]
  978. - Checking systemd journal status [ FOUND ]
  979. - Checking Metalog status [ NOT FOUND ]
  980. - Checking RSyslog status [ FOUND ]
  981. - Checking RFC 3195 daemon status [ NOT FOUND ]
  982. - Checking minilogd instances [ NOT FOUND ]
  983. - Checking logrotate presence [ OK ]
  984. - Checking log directories (static list) [ DONE ]
  985. - Checking open log files [ DONE ]
  986. - Checking deleted files in use [ FILES FOUND ]
  987.  
  988. [+] Insecure services
  989. ------------------------------------
  990. - Checking inetd status [ NOT ACTIVE ]
  991.  
  992. [+] Banners and identification
  993. ------------------------------------
  994. - /etc/issue [ FOUND ]
  995. - /etc/issue contents [ WEAK ]
  996. - /etc/issue.net [ FOUND ]
  997. - /etc/issue.net contents [ WEAK ]
  998.  
  999. [+] Scheduled tasks
  1000. ------------------------------------
  1001. - Checking crontab/cronjob [ DONE ]
  1002.  
  1003. [+] Accounting
  1004. ------------------------------------
  1005. - Checking accounting information [ NOT FOUND ]
  1006. - Checking sysstat accounting data [ NOT FOUND ]
  1007.  
  1008. [+] Time and Synchronization
  1009. ------------------------------------
  1010. - NTP daemon found: systemd (timesyncd) [ FOUND ]
  1011. - Checking for a running NTP daemon or client [ OK ]
  1012.  
  1013. [+] Cryptography
  1014. ------------------------------------
  1015. - Checking for expired SSL certificates [ NONE ]
  1016.  
  1017. [+] Virtualization
  1018. ------------------------------------
  1019.  
  1020. [+] Containers
  1021. ------------------------------------
  1022.  
  1023. [+] Security frameworks
  1024. ------------------------------------
  1025. - Checking presence AppArmor [ NOT FOUND ]
  1026. - Checking presence SELinux [ NOT FOUND ]
  1027. - Checking presence grsecurity [ NOT FOUND ]
  1028. - Checking for implemented MAC framework [ NONE ]
  1029.  
  1030. [+] Software: file integrity
  1031. ------------------------------------
  1032. - Checking file integrity tools
  1033. - Checking presence integrity tool [ NOT FOUND ]
  1034.  
  1035. [+] Software: System tooling
  1036. ------------------------------------
  1037. - Checking presence of Fail2ban [ FOUND ]
  1038. WARNING 'backend' not defined in 'ssh'. Using default one: 'auto'
  1039. WARNING 'backend' not defined in 'nextcloud'. Using default one: 'auto'
  1040. - Checking Fail2ban jails [ ENABLED ]
  1041. - Checking for IDS/IPS tooling [ FOUND ]
  1042.  
  1043. [+] Software: Malware
  1044. ------------------------------------
  1045.  
  1046. [+] File Permissions
  1047. ------------------------------------
  1048. - Starting file permissions check
  1049. /etc/lilo.conf [ NOT FOUND ]
  1050. /root/.ssh [ OK ]
  1051. /etc/lilo.conf [ NOT FOUND ]
  1052. /root/.ssh [ OK ]
  1053.  
  1054. [+] Home directories
  1055. ------------------------------------
  1056. - Checking shell history files [ OK ]
  1057.  
  1058. [+] Kernel Hardening
  1059. ------------------------------------
  1060. - Comparing sysctl key pairs with scan profile
  1061. - kernel.core_uses_pid (exp: 1) [ DIFFERENT ]
  1062. - kernel.ctrl-alt-del (exp: 0) [ OK ]
  1063. - kernel.kptr_restrict (exp: 2) [ DIFFERENT ]
  1064. - kernel.randomize_va_space (exp: 2) [ OK ]
  1065. - kernel.sysrq (exp: 0) [ DIFFERENT ]
  1066. - net.ipv4.conf.all.accept_redirects (exp: 0) [ OK ]
  1067. - net.ipv4.conf.all.accept_source_route (exp: 0) [ OK ]
  1068. - net.ipv4.conf.all.bootp_relay (exp: 0) [ OK ]
  1069. - net.ipv4.conf.all.forwarding (exp: 0) [ OK ]
  1070. - net.ipv4.conf.all.log_martians (exp: 1) [ DIFFERENT ]
  1071. - net.ipv4.conf.all.mc_forwarding (exp: 0) [ OK ]
  1072. - net.ipv4.conf.all.proxy_arp (exp: 0) [ OK ]
  1073. - net.ipv4.conf.all.rp_filter (exp: 1) [ OK ]
  1074. - net.ipv4.conf.all.send_redirects (exp: 0) [ DIFFERENT ]
  1075. - net.ipv4.conf.default.accept_redirects (exp: 0) [ OK ]
  1076. - net.ipv4.conf.default.accept_source_route (exp: 0) [ OK ]
  1077. - net.ipv4.conf.default.log_martians (exp: 1) [ DIFFERENT ]
  1078. - net.ipv4.icmp_echo_ignore_broadcasts (exp: 1) [ OK ]
  1079. - net.ipv4.icmp_ignore_bogus_error_responses (exp: 1) [ OK ]
  1080. - net.ipv4.tcp_syncookies (exp: 1) [ OK ]
  1081. - net.ipv4.tcp_timestamps (exp: 0) [ DIFFERENT ]
  1082. - net.ipv6.conf.all.accept_redirects (exp: 0) [ OK ]
  1083. - net.ipv6.conf.all.accept_source_route (exp: 0) [ OK ]
  1084. - net.ipv6.conf.default.accept_redirects (exp: 0) [ OK ]
  1085. - net.ipv6.conf.default.accept_source_route (exp: 0) [ OK ]
  1086.  
  1087. [+] Hardening
  1088. ------------------------------------
  1089. - Installed compiler(s) [ FOUND ]
  1090. - Installed malware scanner [ NOT FOUND ]
  1091. - Installed malware scanner [ NOT FOUND ]
  1092.  
  1093. [+] Custom Tests
  1094. ------------------------------------
  1095. - Running custom tests...  [ NONE ]
  1096.  
  1097. [+] Plugins (phase 2)
  1098. ------------------------------------
  1099.  
  1100. ================================================================================
  1101.  
  1102. -[ Lynis 2.4.0 Results ]-
  1103.  
  1104. Warnings (2):
  1105. ----------------------------
  1106. ! Version of Lynis is very old and should be updated [LYNIS]
  1107. https://cisofy.com/controls/LYNIS/
  1108.  
  1109. ! Found mail_name in SMTP banner, and/or mail_name contains 'Postfix' [MAIL-8818]
  1110. https://cisofy.com/controls/MAIL-8818/
  1111.  
  1112. Suggestions (30):
  1113. ----------------------------
  1114. * Install libpam-tmpdir to set $TMP and $TMPDIR for PAM sessions [CUST-0280]
  1115. https://your-domain.example.org/controls/CUST-0280/
  1116.  
  1117. * Install libpam-usb to enable multi-factor authentication for PAM sessions [CUST-0285]
  1118. https://your-domain.example.org/controls/CUST-0285/
  1119.  
  1120. * Install needrestart, alternatively to debian-goodies, so that you can run needrestart after upgrades to determine which daemons are using old versions of libraries and need restarting. [CUST-0831]
  1121. https://your-domain.example.org/controls/CUST-0831/
  1122.  
  1123. * Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [AUTH-9262]
  1124. https://cisofy.com/controls/AUTH-9262/
  1125.  
  1126. * Configure minimum password age in /etc/login.defs [AUTH-9286]
  1127. https://cisofy.com/controls/AUTH-9286/
  1128.  
  1129. * Configure maximum password age in /etc/login.defs [AUTH-9286]
  1130. https://cisofy.com/controls/AUTH-9286/
  1131.  
  1132. * Default umask in /etc/login.defs could be more strict like 027 [AUTH-9328]
  1133. https://cisofy.com/controls/AUTH-9328/
  1134.  
  1135. * Purge old/removed packages (14 found) with aptitude purge or dpkg --purge command. This will cleanup old configuration files, cron jobs and startup scripts. [PKGS-7346]
  1136. https://cisofy.com/controls/PKGS-7346/
  1137.  
  1138. * Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]
  1139. https://cisofy.com/controls/NETW-3032/
  1140.  
  1141. * You are advised to hide the mail_name (option: smtpd_banner) from your postfix configuration. Use postconf -e or change your main.cf file (/etc/postfix/main.cf) [MAIL-8818]
  1142. https://cisofy.com/controls/MAIL-8818/
  1143.  
  1144. * Consider hardening SSH configuration [SSH-7408]
  1145. - Details : AllowTcpForwarding (YES --> NO)
  1146. https://cisofy.com/controls/SSH-7408/
  1147.  
  1148. * Consider hardening SSH configuration [SSH-7408]
  1149. - Details : ClientAliveCountMax (3 --> 2)
  1150. https://cisofy.com/controls/SSH-7408/
  1151.  
  1152. * Consider hardening SSH configuration [SSH-7408]
  1153. - Details : Compression (YES --> NO)
  1154. https://cisofy.com/controls/SSH-7408/
  1155.  
  1156. * Consider hardening SSH configuration [SSH-7408]
  1157. - Details : LogLevel (INFO --> VERBOSE)
  1158. https://cisofy.com/controls/SSH-7408/
  1159.  
  1160. * Consider hardening SSH configuration [SSH-7408]
  1161. - Details : MaxAuthTries (6 --> 1)
  1162. https://cisofy.com/controls/SSH-7408/
  1163.  
  1164. * Consider hardening SSH configuration [SSH-7408]
  1165. - Details : MaxSessions (10 --> 2)
  1166. https://cisofy.com/controls/SSH-7408/
  1167.  
  1168. * Consider hardening SSH configuration [SSH-7408]
  1169. - Details : PermitRootLogin (WITHOUT-PASSWORD --> NO)
  1170. https://cisofy.com/controls/SSH-7408/
  1171.  
  1172. * Consider hardening SSH configuration [SSH-7408]
  1173. - Details : Port (22 --> )
  1174. https://cisofy.com/controls/SSH-7408/
  1175.  
  1176. * Consider hardening SSH configuration [SSH-7408]
  1177. - Details : TCPKeepAlive (YES --> NO)
  1178. https://cisofy.com/controls/SSH-7408/
  1179.  
  1180. * Consider hardening SSH configuration [SSH-7408]
  1181. - Details : X11Forwarding (YES --> NO)
  1182. https://cisofy.com/controls/SSH-7408/
  1183.  
  1184. * Consider hardening SSH configuration [SSH-7408]
  1185. - Details : AllowAgentForwarding (YES --> NO)
  1186. https://cisofy.com/controls/SSH-7408/
  1187.  
  1188. * Check what deleted files are still in use and why. [LOGG-2190]
  1189. https://cisofy.com/controls/LOGG-2190/
  1190.  
  1191. * Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
  1192. https://cisofy.com/controls/BANN-7126/
  1193.  
  1194. * Add legal banner to /etc/issue.net, to warn unauthorized users [BANN-7130]
  1195. https://cisofy.com/controls/BANN-7130/
  1196.  
  1197. * Enable process accounting [ACCT-9622]
  1198. https://cisofy.com/controls/ACCT-9622/
  1199.  
  1200. * Enable sysstat to collect accounting (no results) [ACCT-9626]
  1201. https://cisofy.com/controls/ACCT-9626/
  1202.  
  1203. * Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
  1204. https://cisofy.com/controls/FINT-4350/
  1205.  
  1206. * One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
  1207. https://cisofy.com/controls/KRNL-6000/
  1208.  
  1209. * Harden compilers like restricting access to root user only [HRDN-7222]
  1210. https://cisofy.com/controls/HRDN-7222/
  1211.  
  1212. * Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
  1213. - Solution : Install a tool like rkhunter, chkrootkit, OSSEC
  1214. https://cisofy.com/controls/HRDN-7230/
  1215.  
  1216. Follow-up:
  1217. ----------------------------
  1218. - Show details of a test (lynis show details TEST-ID)
  1219. - Check the logfile for all details (less /var/log/lynis.log)
  1220. - Read security controls texts (https://cisofy.com)
  1221. - Use --upload to upload data to central system (Lynis Enterprise users)
  1222.  
  1223. ================================================================================
  1224.  
  1225. Lynis security scan details:
  1226.  
  1227. Hardening index : 65 [############# ]
  1228. Tests performed : 205
  1229. Plugins enabled : 1
  1230.  
  1231. Components:
  1232. - Firewall [V]
  1233. - Malware scanner [X]
  1234.  
  1235. Lynis Modules:
  1236. - Compliance Status [?]
  1237. - Security Audit [V]
  1238. - Vulnerability Scan [V]
  1239.  
  1240. Files:
  1241. - Test and debug information : /var/log/lynis.log
  1242. - Report data : /var/log/lynis-report.dat
  1243.  
  1244. ================================================================================
  1245. Notice: Lynis update available
  1246. Current version : 240 Latest version : 266
  1247. ================================================================================
  1248.  
  1249. Lynis 2.4.0
  1250.  
  1251. Auditing, system hardening, and compliance for UNIX-based systems
  1252. (Linux, macOS, BSD, and others)
  1253.  
  1254. 2007-2016, CISOfy - https://cisofy.com/lynis/
  1255. Enterprise support available (compliance, plugins, interface and tools)
  1256.  
  1257. ================================================================================
  1258.  
  1259. [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
  1260.  
  1261. Known vulnerabilities in this system
  1262. CVE-2017-14160 libvorbisfile3 (remotely exploitable, medium urgency)
  1263. CVE-2018-10392 libvorbisfile3 (remotely exploitable, medium urgency)
  1264. CVE-2018-10393 libvorbisfile3 (remotely exploitable, medium urgency)
  1265. CVE-2016-10317 libgs9-common (remotely exploitable, medium urgency)
  1266. CVE-2018-10194 libgs9-common (remotely exploitable, medium urgency)
  1267. CVE-2018-11645 libgs9-common (remotely exploitable, low urgency)
  1268. CVE-2017-7272 php7.0-mysql (remotely exploitable, medium urgency)
  1269. CVE-2017-8923 php7.0-mysql (remotely exploitable, high urgency)
  1270. CVE-2017-17087 vim-tiny (low urgency)
  1271. CVE-2018-10754 libncurses5 (remotely exploitable, low urgency)
  1272. CVE-2016-10040 libqt5core5a (remotely exploitable, medium urgency)
  1273. CVE-2018-1060 python3.5 (low urgency)
  1274. CVE-2018-1061 python3.5 (low urgency)
  1275. CVE-2017-10268 mariadb-common (low urgency)
  1276. CVE-2017-10378 mariadb-common (remotely exploitable, medium urgency)
  1277. CVE-2017-15365 mariadb-common (remotely exploitable, medium urgency)
  1278. CVE-2017-3636 mariadb-common (medium urgency)
  1279. CVE-2017-3641 mariadb-common (remotely exploitable, medium urgency)
  1280. CVE-2017-3653 mariadb-common (remotely exploitable, low urgency)
  1281. CVE-2018-2562 mariadb-common (remotely exploitable, high urgency)
  1282. CVE-2018-2612 mariadb-common (remotely exploitable, high urgency)
  1283. CVE-2018-2622 mariadb-common (remotely exploitable, medium urgency)
  1284. CVE-2018-2640 mariadb-common (remotely exploitable, medium urgency)
  1285. CVE-2018-2665 mariadb-common (remotely exploitable, medium urgency)
  1286. CVE-2018-2668 mariadb-common (remotely exploitable, medium urgency)
  1287. CVE-2018-2755 mariadb-common (low urgency)
  1288. CVE-2018-2761 mariadb-common (remotely exploitable, medium urgency)
  1289. CVE-2018-2766 mariadb-common (remotely exploitable, medium urgency)
  1290. CVE-2018-2767 mariadb-common (remotely exploitable, low urgency)
  1291. CVE-2018-2771 mariadb-common (remotely exploitable, low urgency)
  1292. CVE-2018-2781 mariadb-common (remotely exploitable, medium urgency)
  1293. CVE-2018-2782 mariadb-common (remotely exploitable, medium urgency)
  1294. CVE-2018-2784 mariadb-common (remotely exploitable, medium urgency)
  1295. CVE-2018-2787 mariadb-common (remotely exploitable, medium urgency)
  1296. CVE-2018-2813 mariadb-common (remotely exploitable, medium urgency)
  1297. CVE-2018-2817 mariadb-common (remotely exploitable, medium urgency)
  1298. CVE-2018-2819 mariadb-common (remotely exploitable, medium urgency)
  1299. CVE-2018-3081 mariadb-common (remotely exploitable, medium urgency)
  1300. CVE-2017-12613 libapr1 (low urgency)
  1301. CVE-2017-1000445 imagemagick-6-common (remotely exploitable, medium urgency)
  1302. CVE-2017-1000476 imagemagick-6-common (remotely exploitable, high urgency)
  1303. CVE-2017-11531 imagemagick-6-common (remotely exploitable, medium urgency)
  1304. CVE-2017-11532 imagemagick-6-common (remotely exploitable, medium urgency)
  1305. CVE-2017-11534 imagemagick-6-common (remotely exploitable, medium urgency)
  1306. CVE-2017-11539 imagemagick-6-common (remotely exploitable, medium urgency)
  1307. CVE-2017-11644 imagemagick-6-common (remotely exploitable, medium urgency)
  1308. CVE-2017-11724 imagemagick-6-common (remotely exploitable, medium urgency)
  1309. CVE-2017-11751 imagemagick-6-common (remotely exploitable, medium urgency)
  1310. CVE-2017-11752 imagemagick-6-common (remotely exploitable, medium urgency)
  1311. CVE-2017-12140 imagemagick-6-common (remotely exploitable, high urgency)
  1312. CVE-2017-12418 imagemagick-6-common (remotely exploitable, medium urgency)
  1313. CVE-2017-12427 imagemagick-6-common (remotely exploitable, medium urgency)
  1314. CVE-2017-12429 imagemagick-6-common (remotely exploitable, high urgency)
  1315. CVE-2017-12430 imagemagick-6-common (remotely exploitable, high urgency)
  1316. CVE-2017-12433 imagemagick-6-common (remotely exploitable, medium urgency)
  1317. CVE-2017-12435 imagemagick-6-common (remotely exploitable, high urgency)
  1318. CVE-2017-12563 imagemagick-6-common (remotely exploitable, high urgency)
  1319. CVE-2017-12564 imagemagick-6-common (remotely exploitable, medium urgency)
  1320. CVE-2017-12565 imagemagick-6-common (remotely exploitable, medium urgency)
  1321. CVE-2017-12566 imagemagick-6-common (remotely exploitable, medium urgency)
  1322. CVE-2017-12641 imagemagick-6-common (remotely exploitable, medium urgency)
  1323. CVE-2017-12642 imagemagick-6-common (remotely exploitable, medium urgency)
  1324. CVE-2017-12643 imagemagick-6-common (remotely exploitable, high urgency)
  1325. CVE-2017-12654 imagemagick-6-common (remotely exploitable, medium urgency)
  1326. CVE-2017-12664 imagemagick-6-common (remotely exploitable, medium urgency)
  1327. CVE-2017-12665 imagemagick-6-common (remotely exploitable, medium urgency)
  1328. CVE-2017-12668 imagemagick-6-common (remotely exploitable, medium urgency)
  1329. CVE-2017-12670 imagemagick-6-common (remotely exploitable, medium urgency)
  1330. CVE-2017-12674 imagemagick-6-common (remotely exploitable, high urgency)
  1331. CVE-2017-12675 imagemagick-6-common (remotely exploitable, medium urgency)
  1332. CVE-2017-12676 imagemagick-6-common (remotely exploitable, medium urgency)
  1333. CVE-2017-12691 imagemagick-6-common (remotely exploitable, high urgency)
  1334. CVE-2017-12692 imagemagick-6-common (remotely exploitable, high urgency)
  1335. CVE-2017-12693 imagemagick-6-common (remotely exploitable, high urgency)
  1336. CVE-2017-12875 imagemagick-6-common (remotely exploitable, high urgency)
  1337. CVE-2017-13061 imagemagick-6-common (remotely exploitable, medium urgency)
  1338. CVE-2017-13133 imagemagick-6-common (remotely exploitable, high urgency)
  1339. CVE-2017-13146 imagemagick-6-common (remotely exploitable, medium urgency)
  1340. CVE-2017-13658 imagemagick-6-common (remotely exploitable, medium urgency)
  1341. CVE-2017-13768 imagemagick-6-common (remotely exploitable, medium urgency)
  1342. CVE-2017-14060 imagemagick-6-common (remotely exploitable, medium urgency)
  1343. CVE-2017-14172 imagemagick-6-common (remotely exploitable, high urgency)
  1344. CVE-2017-14173 imagemagick-6-common (remotely exploitable, medium urgency)
  1345. CVE-2017-14174 imagemagick-6-common (remotely exploitable, high urgency)
  1346. CVE-2017-14175 imagemagick-6-common (remotely exploitable, high urgency)
  1347. CVE-2017-14249 imagemagick-6-common (remotely exploitable, medium urgency)
  1348. CVE-2017-14341 imagemagick-6-common (remotely exploitable, high urgency)
  1349. CVE-2017-14400 imagemagick-6-common (remotely exploitable, medium urgency)
  1350. CVE-2017-14505 imagemagick-6-common (remotely exploitable, medium urgency)
  1351. CVE-2017-14528 imagemagick-6-common (remotely exploitable, medium urgency)
  1352. CVE-2017-14532 imagemagick-6-common (remotely exploitable, high urgency)
  1353. CVE-2017-14624 imagemagick-6-common (remotely exploitable, low urgency)
  1354. CVE-2017-14625 imagemagick-6-common (remotely exploitable, low urgency)
  1355. CVE-2017-14626 imagemagick-6-common (remotely exploitable, low urgency)
  1356. CVE-2017-14739 imagemagick-6-common (remotely exploitable, medium urgency)
  1357. CVE-2017-14741 imagemagick-6-common (remotely exploitable, medium urgency)
  1358. CVE-2017-15015 imagemagick-6-common (remotely exploitable, low urgency)
  1359. CVE-2017-15016 imagemagick-6-common (remotely exploitable, high urgency)
  1360. CVE-2017-15017 imagemagick-6-common (remotely exploitable, high urgency)
  1361. CVE-2017-15217 imagemagick-6-common (remotely exploitable, medium urgency)
  1362. CVE-2017-15281 imagemagick-6-common (remotely exploitable, medium urgency)
  1363. CVE-2017-17681 imagemagick-6-common (remotely exploitable, low urgency)
  1364. CVE-2017-17682 imagemagick-6-common (remotely exploitable, high urgency)
  1365. CVE-2017-17914 imagemagick-6-common (remotely exploitable, high urgency)
  1366. CVE-2017-18209 imagemagick-6-common (remotely exploitable, low urgency)
  1367. CVE-2017-18211 imagemagick-6-common (remotely exploitable, low urgency)
  1368. CVE-2017-18252 imagemagick-6-common (remotely exploitable, low urgency)
  1369. CVE-2017-18271 imagemagick-6-common (remotely exploitable, high urgency)
  1370. CVE-2017-18273 imagemagick-6-common (remotely exploitable, high urgency)
  1371. CVE-2018-10177 imagemagick-6-common (remotely exploitable, medium urgency)
  1372. CVE-2018-10804 imagemagick-6-common (remotely exploitable, medium urgency)
  1373. CVE-2018-10805 imagemagick-6-common (remotely exploitable, medium urgency)
  1374. CVE-2018-14551 imagemagick-6-common
  1375. CVE-2018-7443 imagemagick-6-common (remotely exploitable, medium urgency)
  1376. CVE-2018-8804 imagemagick-6-common (remotely exploitable, low urgency)
  1377. CVE-2018-8960 imagemagick-6-common (remotely exploitable, low urgency)
  1378. CVE-2018-9133 imagemagick-6-common (remotely exploitable, medium urgency)
  1379. CVE-2018-1000030 idle-python2.7 (remotely exploitable, medium urgency)
  1380. CVE-2018-1060 idle-python2.7 (low urgency)
  1381. CVE-2018-1061 idle-python2.7 (low urgency)
  1382. CVE-2018-10754 ncurses-term (remotely exploitable, low urgency)
  1383. CVE-2018-4117 chromium-browser (remotely exploitable, medium urgency)
  1384. CVE-2017-7475 libcairo2 (remotely exploitable, low urgency)
  1385. CVE-2017-9814 libcairo2 (remotely exploitable, low urgency)
  1386. CVE-2018-10754 libtinfo5 (remotely exploitable, low urgency)
  1387. CVE-2017-13135 libx265-95 (remotely exploitable, medium urgency)
  1388. CVE-2018-1049 libudev1 (remotely exploitable, medium urgency)
  1389. CVE-2018-6954 libudev1 (high urgency)
  1390. CVE-2016-9811 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  1391. CVE-2017-5837 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  1392. CVE-2017-5844 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  1393. CVE-2017-11462 libk5crypto3 (remotely exploitable, low urgency)
  1394. CVE-2018-5710 libk5crypto3 (remotely exploitable, medium urgency)
  1395. CVE-2018-5729 libk5crypto3 (remotely exploitable, medium urgency)
  1396. CVE-2018-5730 libk5crypto3 (remotely exploitable, medium urgency)
  1397. CVE-2016-10040 libqt5dbus5 (remotely exploitable, medium urgency)
  1398. CVE-2017-10268 mariadb-client-10.1 (low urgency)
  1399. CVE-2017-10378 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1400. CVE-2017-15365 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1401. CVE-2017-3636 mariadb-client-10.1 (medium urgency)
  1402. CVE-2017-3641 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1403. CVE-2017-3653 mariadb-client-10.1 (remotely exploitable, low urgency)
  1404. CVE-2018-2562 mariadb-client-10.1 (remotely exploitable, high urgency)
  1405. CVE-2018-2612 mariadb-client-10.1 (remotely exploitable, high urgency)
  1406. CVE-2018-2622 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1407. CVE-2018-2640 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1408. CVE-2018-2665 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1409. CVE-2018-2668 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1410. CVE-2018-2755 mariadb-client-10.1 (low urgency)
  1411. CVE-2018-2761 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1412. CVE-2018-2766 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1413. CVE-2018-2767 mariadb-client-10.1 (remotely exploitable, low urgency)
  1414. CVE-2018-2771 mariadb-client-10.1 (remotely exploitable, low urgency)
  1415. CVE-2018-2781 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1416. CVE-2018-2782 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1417. CVE-2018-2784 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1418. CVE-2018-2787 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1419. CVE-2018-2813 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1420. CVE-2018-2817 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1421. CVE-2018-2819 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1422. CVE-2018-3081 mariadb-client-10.1 (remotely exploitable, medium urgency)
  1423. CVE-2017-7272 php7.0-ldap (remotely exploitable, medium urgency)
  1424. CVE-2017-8923 php7.0-ldap (remotely exploitable, high urgency)
  1425. CVE-2017-10971 xserver-common (remotely exploitable, medium urgency)
  1426. CVE-2017-10972 xserver-common (remotely exploitable, medium urgency)
  1427. CVE-2017-12176 xserver-common (remotely exploitable, high urgency)
  1428. CVE-2017-12177 xserver-common (remotely exploitable, high urgency)
  1429. CVE-2017-12178 xserver-common (remotely exploitable, high urgency)
  1430. CVE-2017-12179 xserver-common (remotely exploitable, high urgency)
  1431. CVE-2017-12180 xserver-common (remotely exploitable, high urgency)
  1432. CVE-2017-12181 xserver-common (remotely exploitable, high urgency)
  1433. CVE-2017-12182 xserver-common (remotely exploitable, high urgency)
  1434. CVE-2017-12183 xserver-common (remotely exploitable, high urgency)
  1435. CVE-2017-12184 xserver-common (remotely exploitable, high urgency)
  1436. CVE-2017-12185 xserver-common (remotely exploitable, high urgency)
  1437. CVE-2017-12186 xserver-common (remotely exploitable, high urgency)
  1438. CVE-2017-12187 xserver-common (remotely exploitable, high urgency)
  1439. CVE-2017-13721 xserver-common (low urgency)
  1440. CVE-2017-13723 xserver-common (medium urgency)
  1441. CVE-2017-11671 gcc-4.8-base (low urgency)
  1442. CVE-2017-7272 php7.0-readline (remotely exploitable, medium urgency)
  1443. CVE-2017-8923 php7.0-readline (remotely exploitable, high urgency)
  1444. CVE-2016-10517 redis-tools (remotely exploitable, medium urgency)
  1445. CVE-2018-6594 python-crypto (remotely exploitable, medium urgency)
  1446. CVE-2016-9112 libopenjp2-7 (remotely exploitable, medium urgency)
  1447. CVE-2017-17480 libopenjp2-7 (remotely exploitable, high urgency)
  1448. CVE-2018-14423 libopenjp2-7 (low urgency)
  1449. CVE-2018-5727 libopenjp2-7 (remotely exploitable, low urgency)
  1450. CVE-2018-5785 libopenjp2-7 (remotely exploitable, low urgency)
  1451. CVE-2018-6616 libopenjp2-7 (remotely exploitable, medium urgency)
  1452. CVE-2016-10228 libc6-dbg (remotely exploitable, medium urgency)
  1453. CVE-2017-1000408 libc6-dbg (high urgency)
  1454. CVE-2017-1000409 libc6-dbg (medium urgency)
  1455. CVE-2017-12132 libc6-dbg (remotely exploitable, medium urgency)
  1456. CVE-2017-15670 libc6-dbg (remotely exploitable, high urgency)
  1457. CVE-2017-15671 libc6-dbg (remotely exploitable, medium urgency)
  1458. CVE-2017-15804 libc6-dbg (remotely exploitable, low urgency)
  1459. CVE-2017-16997 libc6-dbg (remotely exploitable, high urgency)
  1460. CVE-2017-18269 libc6-dbg (remotely exploitable, high urgency)
  1461. CVE-2018-1000001 libc6-dbg (high urgency)
  1462. CVE-2018-11236 libc6-dbg (remotely exploitable, low urgency)
  1463. CVE-2018-11237 libc6-dbg (low urgency)
  1464. CVE-2018-6485 libc6-dbg (remotely exploitable, high urgency)
  1465. CVE-2018-6551 libc6-dbg (remotely exploitable, high urgency)
  1466. CVE-2017-12678 libtag1v5 (remotely exploitable, medium urgency)
  1467. CVE-2018-11439 libtag1v5 (remotely exploitable, medium urgency)
  1468. CVE-2018-1049 libpam-systemd (remotely exploitable, medium urgency)
  1469. CVE-2018-6954 libpam-systemd (high urgency)
  1470. CVE-2016-10040 libqt5widgets5 (remotely exploitable, medium urgency)
  1471. CVE-2017-18198 libcdio13 (remotely exploitable, low urgency)
  1472. CVE-2017-18199 libcdio13 (remotely exploitable, low urgency)
  1473. CVE-2017-7272 php7.0-opcache (remotely exploitable, medium urgency)
  1474. CVE-2017-8923 php7.0-opcache (remotely exploitable, high urgency)
  1475. CVE-2016-10040 libqt5network5 (remotely exploitable, medium urgency)
  1476. CVE-2017-1000445 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1477. CVE-2017-1000476 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1478. CVE-2017-11531 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1479. CVE-2017-11532 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1480. CVE-2017-11534 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1481. CVE-2017-11539 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1482. CVE-2017-11644 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1483. CVE-2017-11724 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1484. CVE-2017-11751 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1485. CVE-2017-11752 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1486. CVE-2017-12140 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1487. CVE-2017-12418 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1488. CVE-2017-12427 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1489. CVE-2017-12429 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1490. CVE-2017-12430 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1491. CVE-2017-12433 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1492. CVE-2017-12435 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1493. CVE-2017-12563 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1494. CVE-2017-12564 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1495. CVE-2017-12565 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1496. CVE-2017-12566 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1497. CVE-2017-12641 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1498. CVE-2017-12642 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1499. CVE-2017-12643 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1500. CVE-2017-12654 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1501. CVE-2017-12664 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1502. CVE-2017-12665 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1503. CVE-2017-12668 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1504. CVE-2017-12670 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1505. CVE-2017-12674 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1506. CVE-2017-12675 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1507. CVE-2017-12676 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1508. CVE-2017-12691 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1509. CVE-2017-12692 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1510. CVE-2017-12693 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1511. CVE-2017-12875 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1512. CVE-2017-13061 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1513. CVE-2017-13133 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1514. CVE-2017-13146 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1515. CVE-2017-13658 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1516. CVE-2017-13768 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1517. CVE-2017-14060 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1518. CVE-2017-14172 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1519. CVE-2017-14173 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1520. CVE-2017-14174 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1521. CVE-2017-14175 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1522. CVE-2017-14249 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1523. CVE-2017-14341 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1524. CVE-2017-14400 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1525. CVE-2017-14505 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1526. CVE-2017-14528 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1527. CVE-2017-14532 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1528. CVE-2017-14624 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1529. CVE-2017-14625 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1530. CVE-2017-14626 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1531. CVE-2017-14739 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1532. CVE-2017-14741 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1533. CVE-2017-15015 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1534. CVE-2017-15016 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1535. CVE-2017-15017 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1536. CVE-2017-15217 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1537. CVE-2017-15281 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1538. CVE-2017-17681 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1539. CVE-2017-17682 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1540. CVE-2017-17914 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1541. CVE-2017-18209 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1542. CVE-2017-18211 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1543. CVE-2017-18252 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1544. CVE-2017-18271 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1545. CVE-2017-18273 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  1546. CVE-2018-10177 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1547. CVE-2018-10804 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1548. CVE-2018-10805 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1549. CVE-2018-14551 libmagickcore-6.q16-3
  1550. CVE-2018-7443 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1551. CVE-2018-8804 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1552. CVE-2018-8960 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  1553. CVE-2018-9133 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  1554. CVE-2017-15232 libjpeg62-turbo (remotely exploitable, low urgency)
  1555. CVE-2018-1152 libjpeg62-turbo (low urgency)
  1556. CVE-2017-10268 mariadb-server-core-10.1 (low urgency)
  1557. CVE-2017-10378 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1558. CVE-2017-15365 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1559. CVE-2017-3636 mariadb-server-core-10.1 (medium urgency)
  1560. CVE-2017-3641 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1561. CVE-2017-3653 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  1562. CVE-2018-2562 mariadb-server-core-10.1 (remotely exploitable, high urgency)
  1563. CVE-2018-2612 mariadb-server-core-10.1 (remotely exploitable, high urgency)
  1564. CVE-2018-2622 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1565. CVE-2018-2640 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1566. CVE-2018-2665 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1567. CVE-2018-2668 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1568. CVE-2018-2755 mariadb-server-core-10.1 (low urgency)
  1569. CVE-2018-2761 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1570. CVE-2018-2766 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1571. CVE-2018-2767 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  1572. CVE-2018-2771 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  1573. CVE-2018-2781 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1574. CVE-2018-2782 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1575. CVE-2018-2784 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1576. CVE-2018-2787 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1577. CVE-2018-2813 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1578. CVE-2018-2817 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1579. CVE-2018-2819 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1580. CVE-2018-3081 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  1581. CVE-2017-7272 php7.0-mbstring (remotely exploitable, medium urgency)
  1582. CVE-2017-8923 php7.0-mbstring (remotely exploitable, high urgency)
  1583. CVE-2016-1516 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1584. CVE-2016-1517 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1585. CVE-2017-1000450 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1586. CVE-2017-12597 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1587. CVE-2017-12598 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1588. CVE-2017-12599 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1589. CVE-2017-12600 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
  1590. CVE-2017-12601 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1591. CVE-2017-12602 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
  1592. CVE-2017-12603 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1593. CVE-2017-12604 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1594. CVE-2017-12605 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1595. CVE-2017-12606 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1596. CVE-2017-12862 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1597. CVE-2017-12863 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1598. CVE-2017-12864 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1599. CVE-2017-17760 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1600. CVE-2018-5268 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1601. CVE-2018-5269 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  1602. CVE-2018-7712 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  1603. CVE-2018-7713 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  1604. CVE-2018-7714 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  1605. CVE-2017-11464 librsvg2-2 (remotely exploitable, medium urgency)
  1606. CVE-2018-1000168 libnghttp2-14 (remotely exploitable, low urgency)
  1607. CVE-2017-11399 libavresample3 (remotely exploitable, medium urgency)
  1608. CVE-2017-11665 libavresample3 (remotely exploitable, medium urgency)
  1609. CVE-2017-11719 libavresample3 (remotely exploitable, medium urgency)
  1610. CVE-2017-14054 libavresample3 (remotely exploitable, high urgency)
  1611. CVE-2017-14055 libavresample3 (remotely exploitable, high urgency)
  1612. CVE-2017-14056 libavresample3 (remotely exploitable, high urgency)
  1613. CVE-2017-14057 libavresample3 (remotely exploitable, high urgency)
  1614. CVE-2017-14058 libavresample3 (remotely exploitable, medium urgency)
  1615. CVE-2017-14059 libavresample3 (remotely exploitable, high urgency)
  1616. CVE-2017-14169 libavresample3 (remotely exploitable, medium urgency)
  1617. CVE-2017-14170 libavresample3 (remotely exploitable, high urgency)
  1618. CVE-2017-14171 libavresample3 (remotely exploitable, high urgency)
  1619. CVE-2017-14222 libavresample3 (remotely exploitable, high urgency)
  1620. CVE-2017-14223 libavresample3 (remotely exploitable, high urgency)
  1621. CVE-2017-14225 libavresample3 (remotely exploitable, medium urgency)
  1622. CVE-2017-14767 libavresample3 (remotely exploitable, medium urgency)
  1623. CVE-2017-15186 libavresample3 (remotely exploitable, medium urgency)
  1624. CVE-2017-15672 libavresample3 (remotely exploitable, medium urgency)
  1625. CVE-2017-16840 libavresample3 (remotely exploitable, high urgency)
  1626. CVE-2017-17081 libavresample3 (remotely exploitable, medium urgency)
  1627. CVE-2017-9608 libavresample3 (remotely exploitable, medium urgency)
  1628. CVE-2018-10001 libavresample3 (remotely exploitable, medium urgency)
  1629. CVE-2018-12458 libavresample3 (low urgency)
  1630. CVE-2018-12459 libavresample3 (low urgency)
  1631. CVE-2018-13300 libavresample3 (remotely exploitable, medium urgency)
  1632. CVE-2018-13301 libavresample3 (remotely exploitable, low urgency)
  1633. CVE-2018-13302 libavresample3 (remotely exploitable, medium urgency)
  1634. CVE-2018-13303 libavresample3 (remotely exploitable, medium urgency)
  1635. CVE-2018-13304 libavresample3 (remotely exploitable, medium urgency)
  1636. CVE-2018-13305 libavresample3 (remotely exploitable, medium urgency)
  1637. CVE-2018-14394 libavresample3
  1638. CVE-2018-14395 libavresample3
  1639. CVE-2018-1999010 libavresample3
  1640. CVE-2018-1999011 libavresample3
  1641. CVE-2018-1999012 libavresample3
  1642. CVE-2018-1999013 libavresample3
  1643. CVE-2018-6392 libavresample3 (remotely exploitable, medium urgency)
  1644. CVE-2018-6621 libavresample3 (remotely exploitable, medium urgency)
  1645. CVE-2018-6912 libavresample3 (remotely exploitable, low urgency)
  1646. CVE-2018-7557 libavresample3 (remotely exploitable, medium urgency)
  1647. CVE-2018-7751 libavresample3 (remotely exploitable, medium urgency)
  1648. CVE-2018-9841 libavresample3 (remotely exploitable, low urgency)
  1649. CVE-2017-11399 libavutil55 (remotely exploitable, medium urgency)
  1650. CVE-2017-11665 libavutil55 (remotely exploitable, medium urgency)
  1651. CVE-2017-11719 libavutil55 (remotely exploitable, medium urgency)
  1652. CVE-2017-14054 libavutil55 (remotely exploitable, high urgency)
  1653. CVE-2017-14055 libavutil55 (remotely exploitable, high urgency)
  1654. CVE-2017-14056 libavutil55 (remotely exploitable, high urgency)
  1655. CVE-2017-14057 libavutil55 (remotely exploitable, high urgency)
  1656. CVE-2017-14058 libavutil55 (remotely exploitable, medium urgency)
  1657. CVE-2017-14059 libavutil55 (remotely exploitable, high urgency)
  1658. CVE-2017-14169 libavutil55 (remotely exploitable, medium urgency)
  1659. CVE-2017-14170 libavutil55 (remotely exploitable, high urgency)
  1660. CVE-2017-14171 libavutil55 (remotely exploitable, high urgency)
  1661. CVE-2017-14222 libavutil55 (remotely exploitable, high urgency)
  1662. CVE-2017-14223 libavutil55 (remotely exploitable, high urgency)
  1663. CVE-2017-14225 libavutil55 (remotely exploitable, medium urgency)
  1664. CVE-2017-14767 libavutil55 (remotely exploitable, medium urgency)
  1665. CVE-2017-15186 libavutil55 (remotely exploitable, medium urgency)
  1666. CVE-2017-15672 libavutil55 (remotely exploitable, medium urgency)
  1667. CVE-2017-16840 libavutil55 (remotely exploitable, high urgency)
  1668. CVE-2017-17081 libavutil55 (remotely exploitable, medium urgency)
  1669. CVE-2017-9608 libavutil55 (remotely exploitable, medium urgency)
  1670. CVE-2018-10001 libavutil55 (remotely exploitable, medium urgency)
  1671. CVE-2018-12458 libavutil55 (low urgency)
  1672. CVE-2018-12459 libavutil55 (low urgency)
  1673. CVE-2018-13300 libavutil55 (remotely exploitable, medium urgency)
  1674. CVE-2018-13301 libavutil55 (remotely exploitable, low urgency)
  1675. CVE-2018-13302 libavutil55 (remotely exploitable, medium urgency)
  1676. CVE-2018-13303 libavutil55 (remotely exploitable, medium urgency)
  1677. CVE-2018-13304 libavutil55 (remotely exploitable, medium urgency)
  1678. CVE-2018-13305 libavutil55 (remotely exploitable, medium urgency)
  1679. CVE-2018-14394 libavutil55
  1680. CVE-2018-14395 libavutil55
  1681. CVE-2018-1999010 libavutil55
  1682. CVE-2018-1999011 libavutil55
  1683. CVE-2018-1999012 libavutil55
  1684. CVE-2018-1999013 libavutil55
  1685. CVE-2018-6392 libavutil55 (remotely exploitable, medium urgency)
  1686. CVE-2018-6621 libavutil55 (remotely exploitable, medium urgency)
  1687. CVE-2018-6912 libavutil55 (remotely exploitable, low urgency)
  1688. CVE-2018-7557 libavutil55 (remotely exploitable, medium urgency)
  1689. CVE-2018-7751 libavutil55 (remotely exploitable, medium urgency)
  1690. CVE-2018-9841 libavutil55 (remotely exploitable, low urgency)
  1691. CVE-2018-13440 libaudiofile1 (low urgency)
  1692. CVE-2017-17087 xxd (low urgency)
  1693. CVE-2017-7272 php7.0 (remotely exploitable, medium urgency)
  1694. CVE-2017-8923 php7.0 (remotely exploitable, high urgency)
  1695. CVE-2018-14048 libpng16-16
  1696. CVE-2017-14617 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  1697. CVE-2017-14926 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  1698. CVE-2017-14928 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  1699. CVE-2017-18267 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  1700. CVE-2018-13988 libpoppler-qt5-1 (low urgency)
  1701. CVE-2018-10754 libncursesw5 (remotely exploitable, low urgency)
  1702. CVE-2017-12618 libaprutil1-dbd-sqlite3 (low urgency)
  1703. CVE-2018-10017 libopenmpt0 (remotely exploitable, medium urgency)
  1704. CVE-2018-11710 libopenmpt0 (remotely exploitable, medium urgency)
  1705. CVE-2016-2779 libuuid1 (high urgency)
  1706. CVE-2016-10209 libarchive13 (remotely exploitable, medium urgency)
  1707. CVE-2016-10349 libarchive13 (remotely exploitable, medium urgency)
  1708. CVE-2016-10350 libarchive13 (remotely exploitable, medium urgency)
  1709. CVE-2017-14166 libarchive13 (remotely exploitable, medium urgency)
  1710. CVE-2017-14501 libarchive13 (remotely exploitable, medium urgency)
  1711. CVE-2017-14502 libarchive13 (remotely exploitable, medium urgency)
  1712. CVE-2017-14503 libarchive13 (remotely exploitable, medium urgency)
  1713. CVE-2018-6594 python3-crypto (remotely exploitable, medium urgency)
  1714. CVE-2017-13884 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1715. CVE-2017-13885 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1716. CVE-2017-7018 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1717. CVE-2017-7030 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1718. CVE-2017-7034 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1719. CVE-2017-7037 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1720. CVE-2017-7039 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1721. CVE-2017-7046 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1722. CVE-2017-7048 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1723. CVE-2017-7055 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
  1724. CVE-2017-7056 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
  1725. CVE-2017-7061 libwebkit2gtk-4.0-37 (remotely exploitable, high urgency)
  1726. CVE-2017-7064 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1727. CVE-2017-7153 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1728. CVE-2017-7160 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1729. CVE-2017-7161 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1730. CVE-2017-7165 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1731. CVE-2018-4088 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1732. CVE-2018-4089 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1733. CVE-2018-4096 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  1734. CVE-2016-2568 libpolkit-agent-1-0 (medium urgency)
  1735. CVE-2018-1116 libpolkit-agent-1-0
  1736. CVE-2018-14048 libpng-tools
  1737. CVE-2017-10268 mariadb-client-core-10.1 (low urgency)
  1738. CVE-2017-10378 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1739. CVE-2017-15365 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1740. CVE-2017-3636 mariadb-client-core-10.1 (medium urgency)
  1741. CVE-2017-3641 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1742. CVE-2017-3653 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  1743. CVE-2018-2562 mariadb-client-core-10.1 (remotely exploitable, high urgency)
  1744. CVE-2018-2612 mariadb-client-core-10.1 (remotely exploitable, high urgency)
  1745. CVE-2018-2622 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1746. CVE-2018-2640 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1747. CVE-2018-2665 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1748. CVE-2018-2668 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1749. CVE-2018-2755 mariadb-client-core-10.1 (low urgency)
  1750. CVE-2018-2761 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1751. CVE-2018-2766 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1752. CVE-2018-2767 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  1753. CVE-2018-2771 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  1754. CVE-2018-2781 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1755. CVE-2018-2782 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1756. CVE-2018-2784 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1757. CVE-2018-2787 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1758. CVE-2018-2813 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1759. CVE-2018-2817 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1760. CVE-2018-2819 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1761. CVE-2018-3081 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  1762. CVE-2016-2568 policykit-1 (medium urgency)
  1763. CVE-2018-1116 policykit-1
  1764. CVE-2018-1060 libpython3.5 (low urgency)
  1765. CVE-2018-1061 libpython3.5 (low urgency)
  1766. CVE-2014-7913 dhcpcd5 (remotely exploitable, medium urgency)
  1767. CVE-2014-2886 gksu (remotely exploitable, medium urgency)
  1768. CVE-2016-10228 multiarch-support (remotely exploitable, medium urgency)
  1769. CVE-2017-1000408 multiarch-support (high urgency)
  1770. CVE-2017-1000409 multiarch-support (medium urgency)
  1771. CVE-2017-12132 multiarch-support (remotely exploitable, medium urgency)
  1772. CVE-2017-15670 multiarch-support (remotely exploitable, high urgency)
  1773. CVE-2017-15671 multiarch-support (remotely exploitable, medium urgency)
  1774. CVE-2017-15804 multiarch-support (remotely exploitable, low urgency)
  1775. CVE-2017-16997 multiarch-support (remotely exploitable, high urgency)
  1776. CVE-2017-18269 multiarch-support (remotely exploitable, high urgency)
  1777. CVE-2018-1000001 multiarch-support (high urgency)
  1778. CVE-2018-11236 multiarch-support (remotely exploitable, low urgency)
  1779. CVE-2018-11237 multiarch-support (low urgency)
  1780. CVE-2018-6485 multiarch-support (remotely exploitable, high urgency)
  1781. CVE-2018-6551 multiarch-support (remotely exploitable, high urgency)
  1782. CVE-2018-1049 systemd-sysv (remotely exploitable, medium urgency)
  1783. CVE-2018-6954 systemd-sysv (high urgency)
  1784. CVE-2017-18198 libcdio-cdda1 (remotely exploitable, low urgency)
  1785. CVE-2017-18199 libcdio-cdda1 (remotely exploitable, low urgency)
  1786. CVE-2017-14617 libpoppler64 (remotely exploitable, medium urgency)
  1787. CVE-2017-14926 libpoppler64 (remotely exploitable, medium urgency)
  1788. CVE-2017-14928 libpoppler64 (remotely exploitable, medium urgency)
  1789. CVE-2017-18267 libpoppler64 (remotely exploitable, medium urgency)
  1790. CVE-2018-13988 libpoppler64 (low urgency)
  1791. CVE-2018-9234 gpgv (remotely exploitable, low urgency)
  1792. CVE-2018-1060 libpython3.5-stdlib (low urgency)
  1793. CVE-2018-1061 libpython3.5-stdlib (low urgency)
  1794. CVE-2017-11399 libavfilter6 (remotely exploitable, medium urgency)
  1795. CVE-2017-11665 libavfilter6 (remotely exploitable, medium urgency)
  1796. CVE-2017-11719 libavfilter6 (remotely exploitable, medium urgency)
  1797. CVE-2017-14054 libavfilter6 (remotely exploitable, high urgency)
  1798. CVE-2017-14055 libavfilter6 (remotely exploitable, high urgency)
  1799. CVE-2017-14056 libavfilter6 (remotely exploitable, high urgency)
  1800. CVE-2017-14057 libavfilter6 (remotely exploitable, high urgency)
  1801. CVE-2017-14058 libavfilter6 (remotely exploitable, medium urgency)
  1802. CVE-2017-14059 libavfilter6 (remotely exploitable, high urgency)
  1803. CVE-2017-14169 libavfilter6 (remotely exploitable, medium urgency)
  1804. CVE-2017-14170 libavfilter6 (remotely exploitable, high urgency)
  1805. CVE-2017-14171 libavfilter6 (remotely exploitable, high urgency)
  1806. CVE-2017-14222 libavfilter6 (remotely exploitable, high urgency)
  1807. CVE-2017-14223 libavfilter6 (remotely exploitable, high urgency)
  1808. CVE-2017-14225 libavfilter6 (remotely exploitable, medium urgency)
  1809. CVE-2017-14767 libavfilter6 (remotely exploitable, medium urgency)
  1810. CVE-2017-15186 libavfilter6 (remotely exploitable, medium urgency)
  1811. CVE-2017-15672 libavfilter6 (remotely exploitable, medium urgency)
  1812. CVE-2017-16840 libavfilter6 (remotely exploitable, high urgency)
  1813. CVE-2017-17081 libavfilter6 (remotely exploitable, medium urgency)
  1814. CVE-2017-9608 libavfilter6 (remotely exploitable, medium urgency)
  1815. CVE-2018-10001 libavfilter6 (remotely exploitable, medium urgency)
  1816. CVE-2018-12458 libavfilter6 (low urgency)
  1817. CVE-2018-12459 libavfilter6 (low urgency)
  1818. CVE-2018-13300 libavfilter6 (remotely exploitable, medium urgency)
  1819. CVE-2018-13301 libavfilter6 (remotely exploitable, low urgency)
  1820. CVE-2018-13302 libavfilter6 (remotely exploitable, medium urgency)
  1821. CVE-2018-13303 libavfilter6 (remotely exploitable, medium urgency)
  1822. CVE-2018-13304 libavfilter6 (remotely exploitable, medium urgency)
  1823. CVE-2018-13305 libavfilter6 (remotely exploitable, medium urgency)
  1824. CVE-2018-14394 libavfilter6
  1825. CVE-2018-14395 libavfilter6
  1826. CVE-2018-1999010 libavfilter6
  1827. CVE-2018-1999011 libavfilter6
  1828. CVE-2018-1999012 libavfilter6
  1829. CVE-2018-1999013 libavfilter6
  1830. CVE-2018-6392 libavfilter6 (remotely exploitable, medium urgency)
  1831. CVE-2018-6621 libavfilter6 (remotely exploitable, medium urgency)
  1832. CVE-2018-6912 libavfilter6 (remotely exploitable, low urgency)
  1833. CVE-2018-7557 libavfilter6 (remotely exploitable, medium urgency)
  1834. CVE-2018-7751 libavfilter6 (remotely exploitable, medium urgency)
  1835. CVE-2018-9841 libavfilter6 (remotely exploitable, low urgency)
  1836. CVE-2016-2779 bsdutils (high urgency)
  1837. CVE-2017-16612 libwayland-client0 (remotely exploitable, medium urgency)
  1838. CVE-2018-10906 libfuse2
  1839. CVE-2017-11399 libavcodec57 (remotely exploitable, medium urgency)
  1840. CVE-2017-11665 libavcodec57 (remotely exploitable, medium urgency)
  1841. CVE-2017-11719 libavcodec57 (remotely exploitable, medium urgency)
  1842. CVE-2017-14054 libavcodec57 (remotely exploitable, high urgency)
  1843. CVE-2017-14055 libavcodec57 (remotely exploitable, high urgency)
  1844. CVE-2017-14056 libavcodec57 (remotely exploitable, high urgency)
  1845. CVE-2017-14057 libavcodec57 (remotely exploitable, high urgency)
  1846. CVE-2017-14058 libavcodec57 (remotely exploitable, medium urgency)
  1847. CVE-2017-14059 libavcodec57 (remotely exploitable, high urgency)
  1848. CVE-2017-14169 libavcodec57 (remotely exploitable, medium urgency)
  1849. CVE-2017-14170 libavcodec57 (remotely exploitable, high urgency)
  1850. CVE-2017-14171 libavcodec57 (remotely exploitable, high urgency)
  1851. CVE-2017-14222 libavcodec57 (remotely exploitable, high urgency)
  1852. CVE-2017-14223 libavcodec57 (remotely exploitable, high urgency)
  1853. CVE-2017-14225 libavcodec57 (remotely exploitable, medium urgency)
  1854. CVE-2017-14767 libavcodec57 (remotely exploitable, medium urgency)
  1855. CVE-2017-15186 libavcodec57 (remotely exploitable, medium urgency)
  1856. CVE-2017-15672 libavcodec57 (remotely exploitable, medium urgency)
  1857. CVE-2017-16840 libavcodec57 (remotely exploitable, high urgency)
  1858. CVE-2017-17081 libavcodec57 (remotely exploitable, medium urgency)
  1859. CVE-2017-9608 libavcodec57 (remotely exploitable, medium urgency)
  1860. CVE-2018-10001 libavcodec57 (remotely exploitable, medium urgency)
  1861. CVE-2018-12458 libavcodec57 (low urgency)
  1862. CVE-2018-12459 libavcodec57 (low urgency)
  1863. CVE-2018-13300 libavcodec57 (remotely exploitable, medium urgency)
  1864. CVE-2018-13301 libavcodec57 (remotely exploitable, low urgency)
  1865. CVE-2018-13302 libavcodec57 (remotely exploitable, medium urgency)
  1866. CVE-2018-13303 libavcodec57 (remotely exploitable, medium urgency)
  1867. CVE-2018-13304 libavcodec57 (remotely exploitable, medium urgency)
  1868. CVE-2018-13305 libavcodec57 (remotely exploitable, medium urgency)
  1869. CVE-2018-14394 libavcodec57
  1870. CVE-2018-14395 libavcodec57
  1871. CVE-2018-1999010 libavcodec57
  1872. CVE-2018-1999011 libavcodec57
  1873. CVE-2018-1999012 libavcodec57
  1874. CVE-2018-1999013 libavcodec57
  1875. CVE-2018-6392 libavcodec57 (remotely exploitable, medium urgency)
  1876. CVE-2018-6621 libavcodec57 (remotely exploitable, medium urgency)
  1877. CVE-2018-6912 libavcodec57 (remotely exploitable, low urgency)
  1878. CVE-2018-7557 libavcodec57 (remotely exploitable, medium urgency)
  1879. CVE-2018-7751 libavcodec57 (remotely exploitable, medium urgency)
  1880. CVE-2018-9841 libavcodec57 (remotely exploitable, low urgency)
  1881. CVE-2017-7475 libcairo-gobject2 (remotely exploitable, low urgency)
  1882. CVE-2017-9814 libcairo-gobject2 (remotely exploitable, low urgency)
  1883. CVE-2016-9797 libbluetooth3 (remotely exploitable, medium urgency)
  1884. CVE-2016-9798 libbluetooth3 (remotely exploitable, medium urgency)
  1885. CVE-2016-9799 libbluetooth3 (remotely exploitable, medium urgency)
  1886. CVE-2016-9800 libbluetooth3 (remotely exploitable, medium urgency)
  1887. CVE-2016-9801 libbluetooth3 (remotely exploitable, medium urgency)
  1888. CVE-2016-9802 libbluetooth3 (remotely exploitable, medium urgency)
  1889. CVE-2016-9803 libbluetooth3 (remotely exploitable, medium urgency)
  1890. CVE-2016-9804 libbluetooth3 (remotely exploitable, medium urgency)
  1891. CVE-2016-9917 libbluetooth3 (remotely exploitable, medium urgency)
  1892. CVE-2016-9918 libbluetooth3 (remotely exploitable, medium urgency)
  1893. CVE-2017-1000250 libbluetooth3 (remotely exploitable, low urgency)
  1894. CVE-2018-10910 libbluetooth3
  1895. CVE-2018-1060 python3.5-venv (low urgency)
  1896. CVE-2018-1061 python3.5-venv (low urgency)
  1897. CVE-2018-9234 gnupg (remotely exploitable, low urgency)
  1898. CVE-2018-12910 libsoup2.4-1
  1899. CVE-2018-1000035 unzip (remotely exploitable, medium urgency)
  1900. CVE-2016-10723 linux-libc-dev
  1901. CVE-2016-8660 linux-libc-dev (low urgency)
  1902. CVE-2017-18232 linux-libc-dev (low urgency)
  1903. CVE-2017-18249 linux-libc-dev (medium urgency)
  1904. CVE-2017-18255 linux-libc-dev (medium urgency)
  1905. CVE-2017-5753 linux-libc-dev (medium urgency)
  1906. CVE-2018-1000026 linux-libc-dev (remotely exploitable, medium urgency)
  1907. CVE-2018-1000204 linux-libc-dev
  1908. CVE-2018-10021 linux-libc-dev (medium urgency)
  1909. CVE-2018-10087 linux-libc-dev (low urgency)
  1910. CVE-2018-10124 linux-libc-dev (low urgency)
  1911. CVE-2018-10322 linux-libc-dev (medium urgency)
  1912. CVE-2018-10853 linux-libc-dev
  1913. CVE-2018-10876 linux-libc-dev
  1914. CVE-2018-10877 linux-libc-dev
  1915. CVE-2018-10878 linux-libc-dev
  1916. CVE-2018-10879 linux-libc-dev
  1917. CVE-2018-10880 linux-libc-dev
  1918. CVE-2018-10881 linux-libc-dev
  1919. CVE-2018-10882 linux-libc-dev
  1920. CVE-2018-10883 linux-libc-dev
  1921. CVE-2018-10940 linux-libc-dev (medium urgency)
  1922. CVE-2018-1108 linux-libc-dev (remotely exploitable, medium urgency)
  1923. CVE-2018-1118 linux-libc-dev (low urgency)
  1924. CVE-2018-1120 linux-libc-dev
  1925. CVE-2018-1130 linux-libc-dev (medium urgency)
  1926. CVE-2018-11506 linux-libc-dev (high urgency)
  1927. CVE-2018-12233 linux-libc-dev
  1928. CVE-2018-12928 linux-libc-dev
  1929. CVE-2018-13053 linux-libc-dev
  1930. CVE-2018-13094 linux-libc-dev
  1931. CVE-2018-13096 linux-libc-dev
  1932. CVE-2018-13099 linux-libc-dev
  1933. CVE-2018-13405 linux-libc-dev
  1934. CVE-2018-3639 linux-libc-dev (medium urgency)
  1935. CVE-2018-5814 linux-libc-dev
  1936. CVE-2018-6412 linux-libc-dev (remotely exploitable, medium urgency)
  1937. CVE-2018-7273 linux-libc-dev (medium urgency)
  1938. CVE-2018-7755 linux-libc-dev (remotely exploitable, medium urgency)
  1939. CVE-2016-2779 mount (high urgency)
  1940. CVE-2017-9218 libfaad2 (remotely exploitable, medium urgency)
  1941. CVE-2017-9219 libfaad2 (remotely exploitable, medium urgency)
  1942. CVE-2017-9220 libfaad2 (remotely exploitable, medium urgency)
  1943. CVE-2017-9221 libfaad2 (remotely exploitable, medium urgency)
  1944. CVE-2017-9222 libfaad2 (remotely exploitable, high urgency)
  1945. CVE-2017-9223 libfaad2 (remotely exploitable, medium urgency)
  1946. CVE-2017-9253 libfaad2 (remotely exploitable, high urgency)
  1947. CVE-2017-9254 libfaad2 (remotely exploitable, high urgency)
  1948. CVE-2017-9255 libfaad2 (remotely exploitable, high urgency)
  1949. CVE-2017-9256 libfaad2 (remotely exploitable, high urgency)
  1950. CVE-2017-9257 libfaad2 (remotely exploitable, high urgency)
  1951. CVE-2017-6888 libflac8 (remotely exploitable, low urgency)
  1952. CVE-2018-1049 libsystemd0 (remotely exploitable, medium urgency)
  1953. CVE-2018-6954 libsystemd0 (high urgency)
  1954. CVE-2017-7272 php7.0-gd (remotely exploitable, medium urgency)
  1955. CVE-2017-8923 php7.0-gd (remotely exploitable, high urgency)
  1956. CVE-2016-10228 libc6 (remotely exploitable, medium urgency)
  1957. CVE-2017-1000408 libc6 (high urgency)
  1958. CVE-2017-1000409 libc6 (medium urgency)
  1959. CVE-2017-12132 libc6 (remotely exploitable, medium urgency)
  1960. CVE-2017-15670 libc6 (remotely exploitable, high urgency)
  1961. CVE-2017-15671 libc6 (remotely exploitable, medium urgency)
  1962. CVE-2017-15804 libc6 (remotely exploitable, low urgency)
  1963. CVE-2017-16997 libc6 (remotely exploitable, high urgency)
  1964. CVE-2017-18269 libc6 (remotely exploitable, high urgency)
  1965. CVE-2018-1000001 libc6 (high urgency)
  1966. CVE-2018-11236 libc6 (remotely exploitable, low urgency)
  1967. CVE-2018-11237 libc6 (low urgency)
  1968. CVE-2018-6485 libc6 (remotely exploitable, high urgency)
  1969. CVE-2018-6551 libc6 (remotely exploitable, high urgency)
  1970. CVE-2018-1000030 python2.7 (remotely exploitable, medium urgency)
  1971. CVE-2018-1060 python2.7 (low urgency)
  1972. CVE-2018-1061 python2.7 (low urgency)
  1973. CVE-2018-5711 libgd3 (remotely exploitable, medium urgency)
  1974. CVE-2017-16611 libxfont2 (low urgency)
  1975. CVE-2018-1060 idle-python3.5 (low urgency)
  1976. CVE-2018-1061 idle-python3.5 (low urgency)
  1977. CVE-2017-11613 libtiff5 (remotely exploitable, medium urgency)
  1978. CVE-2017-17942 libtiff5 (remotely exploitable, medium urgency)
  1979. CVE-2018-10963 libtiff5 (remotely exploitable, medium urgency)
  1980. CVE-2018-12900 libtiff5
  1981. CVE-2018-14373 libtiff5
  1982. CVE-2018-14374 libtiff5
  1983. CVE-2018-14375 libtiff5
  1984. CVE-2018-14378 libtiff5
  1985. CVE-2018-5360 libtiff5 (remotely exploitable, medium urgency)
  1986. CVE-2018-5784 libtiff5 (remotely exploitable, medium urgency)
  1987. CVE-2018-7456 libtiff5 (remotely exploitable, medium urgency)
  1988. CVE-2018-8905 libtiff5 (remotely exploitable, medium urgency)
  1989. CVE-2016-2779 libfdisk1 (high urgency)
  1990. CVE-2017-7272 php7.0-mcrypt (remotely exploitable, medium urgency)
  1991. CVE-2017-8923 php7.0-mcrypt (remotely exploitable, high urgency)
  1992. CVE-2016-3977 libgif7 (remotely exploitable, medium urgency)
  1993. CVE-2018-11489 libgif7 (remotely exploitable, medium urgency)
  1994. CVE-2018-11490 libgif7 (remotely exploitable, medium urgency)
  1995. CVE-2018-12910 libsoup-gnome2.4-1
  1996. CVE-2016-1516 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  1997. CVE-2016-1517 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  1998. CVE-2017-1000450 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  1999. CVE-2017-12597 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2000. CVE-2017-12598 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2001. CVE-2017-12599 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2002. CVE-2017-12600 libopencv-core2.4v5 (remotely exploitable, high urgency)
  2003. CVE-2017-12601 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2004. CVE-2017-12602 libopencv-core2.4v5 (remotely exploitable, high urgency)
  2005. CVE-2017-12603 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2006. CVE-2017-12604 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2007. CVE-2017-12605 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2008. CVE-2017-12606 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2009. CVE-2017-12862 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2010. CVE-2017-12863 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2011. CVE-2017-12864 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2012. CVE-2017-17760 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2013. CVE-2018-5268 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2014. CVE-2018-5269 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  2015. CVE-2018-7712 libopencv-core2.4v5 (remotely exploitable, low urgency)
  2016. CVE-2018-7713 libopencv-core2.4v5 (remotely exploitable, low urgency)
  2017. CVE-2018-7714 libopencv-core2.4v5 (remotely exploitable, low urgency)
  2018. CVE-2016-1516 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2019. CVE-2016-1517 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2020. CVE-2017-1000450 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2021. CVE-2017-12597 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2022. CVE-2017-12598 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2023. CVE-2017-12599 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2024. CVE-2017-12600 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
  2025. CVE-2017-12601 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2026. CVE-2017-12602 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
  2027. CVE-2017-12603 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2028. CVE-2017-12604 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2029. CVE-2017-12605 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2030. CVE-2017-12606 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2031. CVE-2017-12862 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2032. CVE-2017-12863 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2033. CVE-2017-12864 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2034. CVE-2017-17760 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2035. CVE-2018-5268 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2036. CVE-2018-5269 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  2037. CVE-2018-7712 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  2038. CVE-2018-7713 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  2039. CVE-2018-7714 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  2040. CVE-2017-7272 php7.0-curl (remotely exploitable, medium urgency)
  2041. CVE-2017-8923 php7.0-curl (remotely exploitable, high urgency)
  2042. CVE-2017-7272 php7.0-cli (remotely exploitable, medium urgency)
  2043. CVE-2017-8923 php7.0-cli (remotely exploitable, high urgency)
  2044. CVE-2017-1000418 libwildmidi2 (remotely exploitable, medium urgency)
  2045. CVE-2017-11661 libwildmidi2 (remotely exploitable, low urgency)
  2046. CVE-2017-11662 libwildmidi2 (remotely exploitable, low urgency)
  2047. CVE-2017-11663 libwildmidi2 (remotely exploitable, low urgency)
  2048. CVE-2017-11664 libwildmidi2 (remotely exploitable, low urgency)
  2049. CVE-2018-4117 chromium-browser-l10n (remotely exploitable, medium urgency)
  2050. CVE-2016-2781 coreutils (low urgency)
  2051. CVE-2017-12596 libopenexr22 (remotely exploitable, medium urgency)
  2052. CVE-2017-14988 libopenexr22 (remotely exploitable, medium urgency)
  2053. CVE-2017-9110 libopenexr22 (remotely exploitable, medium urgency)
  2054. CVE-2017-9111 libopenexr22 (remotely exploitable, medium urgency)
  2055. CVE-2017-9112 libopenexr22 (remotely exploitable, medium urgency)
  2056. CVE-2017-9113 libopenexr22 (remotely exploitable, medium urgency)
  2057. CVE-2017-9114 libopenexr22 (remotely exploitable, medium urgency)
  2058. CVE-2017-9115 libopenexr22 (remotely exploitable, medium urgency)
  2059. CVE-2017-9116 libopenexr22 (remotely exploitable, medium urgency)
  2060. CVE-2018-10360 file (remotely exploitable, medium urgency)
  2061. CVE-2017-11399 libswresample2 (remotely exploitable, medium urgency)
  2062. CVE-2017-11665 libswresample2 (remotely exploitable, medium urgency)
  2063. CVE-2017-11719 libswresample2 (remotely exploitable, medium urgency)
  2064. CVE-2017-14054 libswresample2 (remotely exploitable, high urgency)
  2065. CVE-2017-14055 libswresample2 (remotely exploitable, high urgency)
  2066. CVE-2017-14056 libswresample2 (remotely exploitable, high urgency)
  2067. CVE-2017-14057 libswresample2 (remotely exploitable, high urgency)
  2068. CVE-2017-14058 libswresample2 (remotely exploitable, medium urgency)
  2069. CVE-2017-14059 libswresample2 (remotely exploitable, high urgency)
  2070. CVE-2017-14169 libswresample2 (remotely exploitable, medium urgency)
  2071. CVE-2017-14170 libswresample2 (remotely exploitable, high urgency)
  2072. CVE-2017-14171 libswresample2 (remotely exploitable, high urgency)
  2073. CVE-2017-14222 libswresample2 (remotely exploitable, high urgency)
  2074. CVE-2017-14223 libswresample2 (remotely exploitable, high urgency)
  2075. CVE-2017-14225 libswresample2 (remotely exploitable, medium urgency)
  2076. CVE-2017-14767 libswresample2 (remotely exploitable, medium urgency)
  2077. CVE-2017-15186 libswresample2 (remotely exploitable, medium urgency)
  2078. CVE-2017-15672 libswresample2 (remotely exploitable, medium urgency)
  2079. CVE-2017-16840 libswresample2 (remotely exploitable, high urgency)
  2080. CVE-2017-17081 libswresample2 (remotely exploitable, medium urgency)
  2081. CVE-2017-9608 libswresample2 (remotely exploitable, medium urgency)
  2082. CVE-2018-10001 libswresample2 (remotely exploitable, medium urgency)
  2083. CVE-2018-12458 libswresample2 (low urgency)
  2084. CVE-2018-12459 libswresample2 (low urgency)
  2085. CVE-2018-13300 libswresample2 (remotely exploitable, medium urgency)
  2086. CVE-2018-13301 libswresample2 (remotely exploitable, low urgency)
  2087. CVE-2018-13302 libswresample2 (remotely exploitable, medium urgency)
  2088. CVE-2018-13303 libswresample2 (remotely exploitable, medium urgency)
  2089. CVE-2018-13304 libswresample2 (remotely exploitable, medium urgency)
  2090. CVE-2018-13305 libswresample2 (remotely exploitable, medium urgency)
  2091. CVE-2018-14394 libswresample2
  2092. CVE-2018-14395 libswresample2
  2093. CVE-2018-1999010 libswresample2
  2094. CVE-2018-1999011 libswresample2
  2095. CVE-2018-1999012 libswresample2
  2096. CVE-2018-1999013 libswresample2
  2097. CVE-2018-6392 libswresample2 (remotely exploitable, medium urgency)
  2098. CVE-2018-6621 libswresample2 (remotely exploitable, medium urgency)
  2099. CVE-2018-6912 libswresample2 (remotely exploitable, low urgency)
  2100. CVE-2018-7557 libswresample2 (remotely exploitable, medium urgency)
  2101. CVE-2018-7751 libswresample2 (remotely exploitable, medium urgency)
  2102. CVE-2018-9841 libswresample2 (remotely exploitable, low urgency)
  2103. CVE-2016-10040 libqt5printsupport5 (remotely exploitable, medium urgency)
  2104. CVE-2017-11462 libkrb5support0 (remotely exploitable, low urgency)
  2105. CVE-2018-5710 libkrb5support0 (remotely exploitable, medium urgency)
  2106. CVE-2018-5729 libkrb5support0 (remotely exploitable, medium urgency)
  2107. CVE-2018-5730 libkrb5support0 (remotely exploitable, medium urgency)
  2108. CVE-2017-10971 xserver-xorg-core (remotely exploitable, medium urgency)
  2109. CVE-2017-10972 xserver-xorg-core (remotely exploitable, medium urgency)
  2110. CVE-2017-12176 xserver-xorg-core (remotely exploitable, high urgency)
  2111. CVE-2017-12177 xserver-xorg-core (remotely exploitable, high urgency)
  2112. CVE-2017-12178 xserver-xorg-core (remotely exploitable, high urgency)
  2113. CVE-2017-12179 xserver-xorg-core (remotely exploitable, high urgency)
  2114. CVE-2017-12180 xserver-xorg-core (remotely exploitable, high urgency)
  2115. CVE-2017-12181 xserver-xorg-core (remotely exploitable, high urgency)
  2116. CVE-2017-12182 xserver-xorg-core (remotely exploitable, high urgency)
  2117. CVE-2017-12183 xserver-xorg-core (remotely exploitable, high urgency)
  2118. CVE-2017-12184 xserver-xorg-core (remotely exploitable, high urgency)
  2119. CVE-2017-12185 xserver-xorg-core (remotely exploitable, high urgency)
  2120. CVE-2017-12186 xserver-xorg-core (remotely exploitable, high urgency)
  2121. CVE-2017-12187 xserver-xorg-core (remotely exploitable, high urgency)
  2122. CVE-2017-13721 xserver-xorg-core (low urgency)
  2123. CVE-2017-13723 xserver-xorg-core (medium urgency)
  2124. CVE-2018-1060 libpython3.5-dev (low urgency)
  2125. CVE-2018-1061 libpython3.5-dev (low urgency)
  2126. CVE-2017-11464 librsvg2-common (remotely exploitable, medium urgency)
  2127. CVE-2017-12852 python-numpy (remotely exploitable, medium urgency)
  2128. CVE-2016-9318 libxml2 (remotely exploitable, medium urgency)
  2129. CVE-2017-16932 libxml2 (remotely exploitable, medium urgency)
  2130. CVE-2017-18258 libxml2 (remotely exploitable, medium urgency)
  2131. CVE-2017-5130 libxml2 (remotely exploitable, medium urgency)
  2132. CVE-2017-5969 libxml2 (remotely exploitable, low urgency)
  2133. CVE-2017-8872 libxml2 (remotely exploitable, medium urgency)
  2134. CVE-2018-14404 libxml2
  2135. CVE-2018-14567 libxml2
  2136. CVE-2016-2779 libblkid1 (high urgency)
  2137. CVE-2017-7272 php7.0-fpm (remotely exploitable, medium urgency)
  2138. CVE-2017-8923 php7.0-fpm (remotely exploitable, high urgency)
  2139. CVE-2018-10360 libmagic-mgc (remotely exploitable, medium urgency)
  2140. CVE-2018-10360 libmagic1 (remotely exploitable, medium urgency)
  2141. CVE-2018-7999 libgraphite2-3 (remotely exploitable, medium urgency)
  2142. CVE-2018-5764 rsync (remotely exploitable, medium urgency)
  2143. CVE-2018-1060 python3.5-minimal (low urgency)
  2144. CVE-2018-1061 python3.5-minimal (low urgency)
  2145. CVE-2017-8834 libcroco3 (remotely exploitable, low urgency)
  2146. CVE-2017-8871 libcroco3 (remotely exploitable, low urgency)
  2147. CVE-2017-11462 libgssapi-krb5-2 (remotely exploitable, low urgency)
  2148. CVE-2018-5710 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  2149. CVE-2018-5729 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  2150. CVE-2018-5730 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  2151. CVE-2016-4607 libxslt1.1 (remotely exploitable, high urgency)
  2152. CVE-2016-4608 libxslt1.1 (remotely exploitable, high urgency)
  2153. CVE-2016-4609 libxslt1.1 (remotely exploitable, high urgency)
  2154. CVE-2016-4610 libxslt1.1 (remotely exploitable, high urgency)
  2155. CVE-2017-2477 libxslt1.1 (remotely exploitable, high urgency)
  2156. CVE-2016-1516 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2157. CVE-2016-1517 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2158. CVE-2017-1000450 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2159. CVE-2017-12597 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2160. CVE-2017-12598 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2161. CVE-2017-12599 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2162. CVE-2017-12600 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
  2163. CVE-2017-12601 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2164. CVE-2017-12602 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
  2165. CVE-2017-12603 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2166. CVE-2017-12604 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2167. CVE-2017-12605 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2168. CVE-2017-12606 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2169. CVE-2017-12862 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2170. CVE-2017-12863 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2171. CVE-2017-12864 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2172. CVE-2017-17760 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2173. CVE-2018-5268 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2174. CVE-2018-5269 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  2175. CVE-2018-7712 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  2176. CVE-2018-7713 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  2177. CVE-2018-7714 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  2178. CVE-2017-14107 libzip4 (remotely exploitable, medium urgency)
  2179. CVE-2016-10040 libqt5sql5-sqlite (remotely exploitable, medium urgency)
  2180. CVE-2017-1000418 libwildmidi-config (remotely exploitable, medium urgency)
  2181. CVE-2017-11661 libwildmidi-config (remotely exploitable, low urgency)
  2182. CVE-2017-11662 libwildmidi-config (remotely exploitable, low urgency)
  2183. CVE-2017-11663 libwildmidi-config (remotely exploitable, low urgency)
  2184. CVE-2017-11664 libwildmidi-config (remotely exploitable, low urgency)
  2185. CVE-2017-12562 libsndfile1 (remotely exploitable, high urgency)
  2186. CVE-2017-14245 libsndfile1 (remotely exploitable, low urgency)
  2187. CVE-2017-14246 libsndfile1 (remotely exploitable, low urgency)
  2188. CVE-2017-14634 libsndfile1 (remotely exploitable, medium urgency)
  2189. CVE-2017-17456 libsndfile1 (remotely exploitable, low urgency)
  2190. CVE-2017-17457 libsndfile1 (remotely exploitable, low urgency)
  2191. CVE-2017-6892 libsndfile1 (remotely exploitable, medium urgency)
  2192. CVE-2018-13419 libsndfile1 (low urgency)
  2193. CVE-2018-0732 libssl1.0.2 (low urgency)
  2194. CVE-2018-0737 libssl1.0.2 (remotely exploitable, low urgency)
  2195. CVE-2017-7272 php7.0-zip (remotely exploitable, medium urgency)
  2196. CVE-2017-8923 php7.0-zip (remotely exploitable, high urgency)
  2197. CVE-2017-15400 libcupsimage2 (remotely exploitable, high urgency)
  2198. CVE-2017-18190 libcupsimage2 (remotely exploitable, medium urgency)
  2199. CVE-2017-18248 libcupsimage2 (remotely exploitable, low urgency)
  2200. CVE-2018-4180 libcupsimage2
  2201. CVE-2018-4181 libcupsimage2
  2202. CVE-2018-6553 libcupsimage2
  2203. CVE-2017-9216 libjbig2dec0 (remotely exploitable, medium urgency)
  2204. CVE-2016-9811 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  2205. CVE-2017-5837 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  2206. CVE-2017-5844 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  2207. CVE-2017-13712 libmp3lame0 (remotely exploitable, low urgency)
  2208. CVE-2017-15019 libmp3lame0 (remotely exploitable, medium urgency)
  2209. CVE-2015-9262 libxcursor1
  2210. CVE-2018-1000156 patch (remotely exploitable, medium urgency)
  2211. CVE-2017-13704 dnsmasq (remotely exploitable, medium urgency)
  2212. CVE-2017-14491 dnsmasq (remotely exploitable, high urgency)
  2213. CVE-2017-14492 dnsmasq (remotely exploitable, high urgency)
  2214. CVE-2017-14493 dnsmasq (remotely exploitable, high urgency)
  2215. CVE-2017-14494 dnsmasq (remotely exploitable, medium urgency)
  2216. CVE-2017-14495 dnsmasq (remotely exploitable, medium urgency)
  2217. CVE-2017-14496 dnsmasq (remotely exploitable, high urgency)
  2218. CVE-2017-15107 dnsmasq (remotely exploitable, medium urgency)
  2219. CVE-2017-12424 passwd (remotely exploitable, high urgency)
  2220. CVE-2018-7169 passwd (remotely exploitable, medium urgency)
  2221. CVE-2016-2568 libpolkit-backend-1-0 (medium urgency)
  2222. CVE-2018-1116 libpolkit-backend-1-0
  2223. CVE-2018-10754 ncurses-base (remotely exploitable, low urgency)
  2224. CVE-2016-10228 libc-bin (remotely exploitable, medium urgency)
  2225. CVE-2017-1000408 libc-bin (high urgency)
  2226. CVE-2017-1000409 libc-bin (medium urgency)
  2227. CVE-2017-12132 libc-bin (remotely exploitable, medium urgency)
  2228. CVE-2017-15670 libc-bin (remotely exploitable, high urgency)
  2229. CVE-2017-15671 libc-bin (remotely exploitable, medium urgency)
  2230. CVE-2017-15804 libc-bin (remotely exploitable, low urgency)
  2231. CVE-2017-16997 libc-bin (remotely exploitable, high urgency)
  2232. CVE-2017-18269 libc-bin (remotely exploitable, high urgency)
  2233. CVE-2018-1000001 libc-bin (high urgency)
  2234. CVE-2018-11236 libc-bin (remotely exploitable, low urgency)
  2235. CVE-2018-11237 libc-bin (low urgency)
  2236. CVE-2018-6485 libc-bin (remotely exploitable, high urgency)
  2237. CVE-2018-6551 libc-bin (remotely exploitable, high urgency)
  2238. CVE-2017-1000445 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2239. CVE-2017-1000476 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2240. CVE-2017-11531 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2241. CVE-2017-11532 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2242. CVE-2017-11534 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2243. CVE-2017-11539 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2244. CVE-2017-11644 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2245. CVE-2017-11724 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2246. CVE-2017-11751 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2247. CVE-2017-11752 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2248. CVE-2017-12140 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2249. CVE-2017-12418 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2250. CVE-2017-12427 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2251. CVE-2017-12429 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2252. CVE-2017-12430 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2253. CVE-2017-12433 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2254. CVE-2017-12435 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2255. CVE-2017-12563 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2256. CVE-2017-12564 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2257. CVE-2017-12565 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2258. CVE-2017-12566 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2259. CVE-2017-12641 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2260. CVE-2017-12642 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2261. CVE-2017-12643 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2262. CVE-2017-12654 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2263. CVE-2017-12664 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2264. CVE-2017-12665 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2265. CVE-2017-12668 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2266. CVE-2017-12670 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2267. CVE-2017-12674 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2268. CVE-2017-12675 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2269. CVE-2017-12676 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2270. CVE-2017-12691 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2271. CVE-2017-12692 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2272. CVE-2017-12693 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2273. CVE-2017-12875 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2274. CVE-2017-13061 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2275. CVE-2017-13133 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2276. CVE-2017-13146 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2277. CVE-2017-13658 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2278. CVE-2017-13768 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2279. CVE-2017-14060 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2280. CVE-2017-14172 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2281. CVE-2017-14173 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2282. CVE-2017-14174 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2283. CVE-2017-14175 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2284. CVE-2017-14249 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2285. CVE-2017-14341 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2286. CVE-2017-14400 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2287. CVE-2017-14505 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2288. CVE-2017-14528 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2289. CVE-2017-14532 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2290. CVE-2017-14624 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2291. CVE-2017-14625 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2292. CVE-2017-14626 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2293. CVE-2017-14739 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2294. CVE-2017-14741 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2295. CVE-2017-15015 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2296. CVE-2017-15016 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2297. CVE-2017-15017 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2298. CVE-2017-15217 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2299. CVE-2017-15281 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2300. CVE-2017-17681 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2301. CVE-2017-17682 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2302. CVE-2017-17914 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2303. CVE-2017-18209 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2304. CVE-2017-18211 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2305. CVE-2017-18252 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2306. CVE-2017-18271 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2307. CVE-2017-18273 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  2308. CVE-2018-10177 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2309. CVE-2018-10804 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2310. CVE-2018-10805 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2311. CVE-2018-14551 libmagickcore-6.q16-3-extra
  2312. CVE-2018-7443 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2313. CVE-2018-8804 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2314. CVE-2018-8960 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  2315. CVE-2018-9133 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  2316. CVE-2016-10040 libqt5xml5 (remotely exploitable, medium urgency)
  2317. CVE-2018-1049 udev (remotely exploitable, medium urgency)
  2318. CVE-2018-6954 udev (high urgency)
  2319. CVE-2017-11399 libswscale4 (remotely exploitable, medium urgency)
  2320. CVE-2017-11665 libswscale4 (remotely exploitable, medium urgency)
  2321. CVE-2017-11719 libswscale4 (remotely exploitable, medium urgency)
  2322. CVE-2017-14054 libswscale4 (remotely exploitable, high urgency)
  2323. CVE-2017-14055 libswscale4 (remotely exploitable, high urgency)
  2324. CVE-2017-14056 libswscale4 (remotely exploitable, high urgency)
  2325. CVE-2017-14057 libswscale4 (remotely exploitable, high urgency)
  2326. CVE-2017-14058 libswscale4 (remotely exploitable, medium urgency)
  2327. CVE-2017-14059 libswscale4 (remotely exploitable, high urgency)
  2328. CVE-2017-14169 libswscale4 (remotely exploitable, medium urgency)
  2329. CVE-2017-14170 libswscale4 (remotely exploitable, high urgency)
  2330. CVE-2017-14171 libswscale4 (remotely exploitable, high urgency)
  2331. CVE-2017-14222 libswscale4 (remotely exploitable, high urgency)
  2332. CVE-2017-14223 libswscale4 (remotely exploitable, high urgency)
  2333. CVE-2017-14225 libswscale4 (remotely exploitable, medium urgency)
  2334. CVE-2017-14767 libswscale4 (remotely exploitable, medium urgency)
  2335. CVE-2017-15186 libswscale4 (remotely exploitable, medium urgency)
  2336. CVE-2017-15672 libswscale4 (remotely exploitable, medium urgency)
  2337. CVE-2017-16840 libswscale4 (remotely exploitable, high urgency)
  2338. CVE-2017-17081 libswscale4 (remotely exploitable, medium urgency)
  2339. CVE-2017-9608 libswscale4 (remotely exploitable, medium urgency)
  2340. CVE-2018-10001 libswscale4 (remotely exploitable, medium urgency)
  2341. CVE-2018-12458 libswscale4 (low urgency)
  2342. CVE-2018-12459 libswscale4 (low urgency)
  2343. CVE-2018-13300 libswscale4 (remotely exploitable, medium urgency)
  2344. CVE-2018-13301 libswscale4 (remotely exploitable, low urgency)
  2345. CVE-2018-13302 libswscale4 (remotely exploitable, medium urgency)
  2346. CVE-2018-13303 libswscale4 (remotely exploitable, medium urgency)
  2347. CVE-2018-13304 libswscale4 (remotely exploitable, medium urgency)
  2348. CVE-2018-13305 libswscale4 (remotely exploitable, medium urgency)
  2349. CVE-2018-14394 libswscale4
  2350. CVE-2018-14395 libswscale4
  2351. CVE-2018-1999010 libswscale4
  2352. CVE-2018-1999011 libswscale4
  2353. CVE-2018-1999012 libswscale4
  2354. CVE-2018-1999013 libswscale4
  2355. CVE-2018-6392 libswscale4 (remotely exploitable, medium urgency)
  2356. CVE-2018-6621 libswscale4 (remotely exploitable, medium urgency)
  2357. CVE-2018-6912 libswscale4 (remotely exploitable, low urgency)
  2358. CVE-2018-7557 libswscale4 (remotely exploitable, medium urgency)
  2359. CVE-2018-7751 libswscale4 (remotely exploitable, medium urgency)
  2360. CVE-2018-9841 libswscale4 (remotely exploitable, low urgency)
  2361. CVE-2016-10040 libqt5gui5 (remotely exploitable, medium urgency)
  2362. CVE-2018-4117 chromium-codecs-ffmpeg-extra (remotely exploitable, medium urgency)
  2363. CVE-2018-0732 libssl1.1 (low urgency)
  2364. CVE-2018-0737 libssl1.1 (remotely exploitable, medium urgency)
  2365. CVE-2017-12618 libaprutil1 (low urgency)
  2366. CVE-2017-7272 php7.0-json (remotely exploitable, medium urgency)
  2367. CVE-2017-8923 php7.0-json (remotely exploitable, high urgency)
  2368. CVE-2016-10228 libc-l10n (remotely exploitable, medium urgency)
  2369. CVE-2017-1000408 libc-l10n (high urgency)
  2370. CVE-2017-1000409 libc-l10n (medium urgency)
  2371. CVE-2017-12132 libc-l10n (remotely exploitable, medium urgency)
  2372. CVE-2017-15670 libc-l10n (remotely exploitable, high urgency)
  2373. CVE-2017-15671 libc-l10n (remotely exploitable, medium urgency)
  2374. CVE-2017-15804 libc-l10n (remotely exploitable, low urgency)
  2375. CVE-2017-16997 libc-l10n (remotely exploitable, high urgency)
  2376. CVE-2017-18269 libc-l10n (remotely exploitable, high urgency)
  2377. CVE-2018-1000001 libc-l10n (high urgency)
  2378. CVE-2018-11236 libc-l10n (remotely exploitable, low urgency)
  2379. CVE-2018-11237 libc-l10n (low urgency)
  2380. CVE-2018-6485 libc-l10n (remotely exploitable, high urgency)
  2381. CVE-2018-6551 libc-l10n (remotely exploitable, high urgency)
  2382. CVE-2018-1049 systemd (remotely exploitable, medium urgency)
  2383. CVE-2018-6954 systemd (high urgency)
  2384. CVE-2018-1000030 libpython2.7 (remotely exploitable, medium urgency)
  2385. CVE-2018-1060 libpython2.7 (low urgency)
  2386. CVE-2018-1061 libpython2.7 (low urgency)
  2387. CVE-2016-10040 libqt5sql5 (remotely exploitable, medium urgency)
  2388. CVE-2017-1000445 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2389. CVE-2017-1000476 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2390. CVE-2017-11531 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2391. CVE-2017-11532 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2392. CVE-2017-11534 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2393. CVE-2017-11539 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2394. CVE-2017-11644 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2395. CVE-2017-11724 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2396. CVE-2017-11751 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2397. CVE-2017-11752 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2398. CVE-2017-12140 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2399. CVE-2017-12418 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2400. CVE-2017-12427 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2401. CVE-2017-12429 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2402. CVE-2017-12430 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2403. CVE-2017-12433 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2404. CVE-2017-12435 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2405. CVE-2017-12563 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2406. CVE-2017-12564 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2407. CVE-2017-12565 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2408. CVE-2017-12566 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2409. CVE-2017-12641 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2410. CVE-2017-12642 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2411. CVE-2017-12643 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2412. CVE-2017-12654 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2413. CVE-2017-12664 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2414. CVE-2017-12665 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2415. CVE-2017-12668 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2416. CVE-2017-12670 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2417. CVE-2017-12674 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2418. CVE-2017-12675 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2419. CVE-2017-12676 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2420. CVE-2017-12691 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2421. CVE-2017-12692 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2422. CVE-2017-12693 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2423. CVE-2017-12875 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2424. CVE-2017-13061 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2425. CVE-2017-13133 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2426. CVE-2017-13146 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2427. CVE-2017-13658 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2428. CVE-2017-13768 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2429. CVE-2017-14060 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2430. CVE-2017-14172 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2431. CVE-2017-14173 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2432. CVE-2017-14174 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2433. CVE-2017-14175 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2434. CVE-2017-14249 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2435. CVE-2017-14341 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2436. CVE-2017-14400 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2437. CVE-2017-14505 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2438. CVE-2017-14528 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2439. CVE-2017-14532 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2440. CVE-2017-14624 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2441. CVE-2017-14625 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2442. CVE-2017-14626 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2443. CVE-2017-14739 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2444. CVE-2017-14741 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2445. CVE-2017-15015 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2446. CVE-2017-15016 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2447. CVE-2017-15017 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2448. CVE-2017-15217 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2449. CVE-2017-15281 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2450. CVE-2017-17681 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2451. CVE-2017-17682 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2452. CVE-2017-17914 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2453. CVE-2017-18209 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2454. CVE-2017-18211 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2455. CVE-2017-18252 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2456. CVE-2017-18271 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2457. CVE-2017-18273 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  2458. CVE-2018-10177 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2459. CVE-2018-10804 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2460. CVE-2018-10805 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2461. CVE-2018-14551 libmagickwand-6.q16-3
  2462. CVE-2018-7443 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2463. CVE-2018-8804 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2464. CVE-2018-8960 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  2465. CVE-2018-9133 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  2466. CVE-2018-0732 openssl (low urgency)
  2467. CVE-2018-0737 openssl (remotely exploitable, medium urgency)
  2468. CVE-2017-11399 libpostproc54 (remotely exploitable, medium urgency)
  2469. CVE-2017-11665 libpostproc54 (remotely exploitable, medium urgency)
  2470. CVE-2017-11719 libpostproc54 (remotely exploitable, medium urgency)
  2471. CVE-2017-14054 libpostproc54 (remotely exploitable, high urgency)
  2472. CVE-2017-14055 libpostproc54 (remotely exploitable, high urgency)
  2473. CVE-2017-14056 libpostproc54 (remotely exploitable, high urgency)
  2474. CVE-2017-14057 libpostproc54 (remotely exploitable, high urgency)
  2475. CVE-2017-14058 libpostproc54 (remotely exploitable, medium urgency)
  2476. CVE-2017-14059 libpostproc54 (remotely exploitable, high urgency)
  2477. CVE-2017-14169 libpostproc54 (remotely exploitable, medium urgency)
  2478. CVE-2017-14170 libpostproc54 (remotely exploitable, high urgency)
  2479. CVE-2017-14171 libpostproc54 (remotely exploitable, high urgency)
  2480. CVE-2017-14222 libpostproc54 (remotely exploitable, high urgency)
  2481. CVE-2017-14223 libpostproc54 (remotely exploitable, high urgency)
  2482. CVE-2017-14225 libpostproc54 (remotely exploitable, medium urgency)
  2483. CVE-2017-14767 libpostproc54 (remotely exploitable, medium urgency)
  2484. CVE-2017-15186 libpostproc54 (remotely exploitable, medium urgency)
  2485. CVE-2017-15672 libpostproc54 (remotely exploitable, medium urgency)
  2486. CVE-2017-16840 libpostproc54 (remotely exploitable, high urgency)
  2487. CVE-2017-17081 libpostproc54 (remotely exploitable, medium urgency)
  2488. CVE-2017-9608 libpostproc54 (remotely exploitable, medium urgency)
  2489. CVE-2018-10001 libpostproc54 (remotely exploitable, medium urgency)
  2490. CVE-2018-12458 libpostproc54 (low urgency)
  2491. CVE-2018-12459 libpostproc54 (low urgency)
  2492. CVE-2018-13300 libpostproc54 (remotely exploitable, medium urgency)
  2493. CVE-2018-13301 libpostproc54 (remotely exploitable, low urgency)
  2494. CVE-2018-13302 libpostproc54 (remotely exploitable, medium urgency)
  2495. CVE-2018-13303 libpostproc54 (remotely exploitable, medium urgency)
  2496. CVE-2018-13304 libpostproc54 (remotely exploitable, medium urgency)
  2497. CVE-2018-13305 libpostproc54 (remotely exploitable, medium urgency)
  2498. CVE-2018-14394 libpostproc54
  2499. CVE-2018-14395 libpostproc54
  2500. CVE-2018-1999010 libpostproc54
  2501. CVE-2018-1999011 libpostproc54
  2502. CVE-2018-1999012 libpostproc54
  2503. CVE-2018-1999013 libpostproc54
  2504. CVE-2018-6392 libpostproc54 (remotely exploitable, medium urgency)
  2505. CVE-2018-6621 libpostproc54 (remotely exploitable, medium urgency)
  2506. CVE-2018-6912 libpostproc54 (remotely exploitable, low urgency)
  2507. CVE-2018-7557 libpostproc54 (remotely exploitable, medium urgency)
  2508. CVE-2018-7751 libpostproc54 (remotely exploitable, medium urgency)
  2509. CVE-2018-9841 libpostproc54 (remotely exploitable, low urgency)
  2510. CVE-2017-17087 vim-common (low urgency)
  2511. CVE-2018-8740 libsqlite3-0 (remotely exploitable, medium urgency)
  2512. CVE-2017-13704 dnsmasq-base (remotely exploitable, medium urgency)
  2513. CVE-2017-14491 dnsmasq-base (remotely exploitable, high urgency)
  2514. CVE-2017-14492 dnsmasq-base (remotely exploitable, high urgency)
  2515. CVE-2017-14493 dnsmasq-base (remotely exploitable, high urgency)
  2516. CVE-2017-14494 dnsmasq-base (remotely exploitable, medium urgency)
  2517. CVE-2017-14495 dnsmasq-base (remotely exploitable, medium urgency)
  2518. CVE-2017-14496 dnsmasq-base (remotely exploitable, high urgency)
  2519. CVE-2017-15107 dnsmasq-base (remotely exploitable, medium urgency)
  2520. CVE-2017-13884 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2521. CVE-2017-13885 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2522. CVE-2017-7018 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2523. CVE-2017-7030 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2524. CVE-2017-7034 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2525. CVE-2017-7037 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2526. CVE-2017-7039 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2527. CVE-2017-7046 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2528. CVE-2017-7048 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2529. CVE-2017-7055 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
  2530. CVE-2017-7056 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
  2531. CVE-2017-7061 libjavascriptcoregtk-4.0-18 (remotely exploitable, high urgency)
  2532. CVE-2017-7064 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2533. CVE-2017-7153 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2534. CVE-2017-7160 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2535. CVE-2017-7161 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2536. CVE-2017-7165 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2537. CVE-2018-4088 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2538. CVE-2018-4089 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2539. CVE-2018-4096 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  2540. CVE-2017-11462 libkrb5-3 (remotely exploitable, low urgency)
  2541. CVE-2018-5710 libkrb5-3 (remotely exploitable, medium urgency)
  2542. CVE-2018-5729 libkrb5-3 (remotely exploitable, medium urgency)
  2543. CVE-2018-5730 libkrb5-3 (remotely exploitable, medium urgency)
  2544. CVE-2017-11671 gcc-4.9-base (low urgency)
  2545. CVE-2018-1000030 libpython2.7-dev (remotely exploitable, medium urgency)
  2546. CVE-2018-1060 libpython2.7-dev (low urgency)
  2547. CVE-2018-1061 libpython2.7-dev (low urgency)
  2548. CVE-2017-12448 binutils (remotely exploitable, medium urgency)
  2549. CVE-2017-12449 binutils (remotely exploitable, medium urgency)
  2550. CVE-2017-12450 binutils (remotely exploitable, medium urgency)
  2551. CVE-2017-12451 binutils (remotely exploitable, medium urgency)
  2552. CVE-2017-12452 binutils (remotely exploitable, medium urgency)
  2553. CVE-2017-12453 binutils (remotely exploitable, medium urgency)
  2554. CVE-2017-12454 binutils (remotely exploitable, medium urgency)
  2555. CVE-2017-12455 binutils (remotely exploitable, medium urgency)
  2556. CVE-2017-12456 binutils (remotely exploitable, medium urgency)
  2557. CVE-2017-12457 binutils (remotely exploitable, medium urgency)
  2558. CVE-2017-12458 binutils (remotely exploitable, medium urgency)
  2559. CVE-2017-12459 binutils (remotely exploitable, medium urgency)
  2560. CVE-2017-12799 binutils (remotely exploitable, medium urgency)
  2561. CVE-2017-12967 binutils (remotely exploitable, medium urgency)
  2562. CVE-2017-13710 binutils (remotely exploitable, medium urgency)
  2563. CVE-2017-13716 binutils (remotely exploitable, low urgency)
  2564. CVE-2017-13757 binutils (remotely exploitable, medium urgency)
  2565. CVE-2017-14128 binutils (remotely exploitable, low urgency)
  2566. CVE-2017-14129 binutils (remotely exploitable, low urgency)
  2567. CVE-2017-14130 binutils (remotely exploitable, low urgency)
  2568. CVE-2017-14333 binutils (remotely exploitable, medium urgency)
  2569. CVE-2017-14529 binutils (remotely exploitable, medium urgency)
  2570. CVE-2017-14729 binutils (remotely exploitable, medium urgency)
  2571. CVE-2017-14745 binutils (remotely exploitable, medium urgency)
  2572. CVE-2017-14930 binutils (remotely exploitable, high urgency)
  2573. CVE-2017-14932 binutils (remotely exploitable, medium urgency)
  2574. CVE-2017-14933 binutils (remotely exploitable, medium urgency)
  2575. CVE-2017-14934 binutils (remotely exploitable, medium urgency)
  2576. CVE-2017-14938 binutils (remotely exploitable, medium urgency)
  2577. CVE-2017-14939 binutils (remotely exploitable, medium urgency)
  2578. CVE-2017-14940 binutils (remotely exploitable, medium urgency)
  2579. CVE-2017-14974 binutils (remotely exploitable, medium urgency)
  2580. CVE-2017-15020 binutils (remotely exploitable, medium urgency)
  2581. CVE-2017-15021 binutils (remotely exploitable, medium urgency)
  2582. CVE-2017-15022 binutils (remotely exploitable, medium urgency)
  2583. CVE-2017-15023 binutils (remotely exploitable, medium urgency)
  2584. CVE-2017-15024 binutils (remotely exploitable, medium urgency)
  2585. CVE-2017-15025 binutils (remotely exploitable, medium urgency)
  2586. CVE-2017-15225 binutils (remotely exploitable, medium urgency)
  2587. CVE-2017-15938 binutils (remotely exploitable, medium urgency)
  2588. CVE-2017-15996 binutils (remotely exploitable, medium urgency)
  2589. CVE-2017-16826 binutils (remotely exploitable, medium urgency)
  2590. CVE-2017-16827 binutils (remotely exploitable, medium urgency)
  2591. CVE-2017-16828 binutils (remotely exploitable, medium urgency)
  2592. CVE-2017-16829 binutils (remotely exploitable, medium urgency)
  2593. CVE-2017-16830 binutils (remotely exploitable, medium urgency)
  2594. CVE-2017-16831 binutils (remotely exploitable, medium urgency)
  2595. CVE-2017-16832 binutils (remotely exploitable, medium urgency)
  2596. CVE-2017-17080 binutils (remotely exploitable, medium urgency)
  2597. CVE-2017-17121 binutils (remotely exploitable, medium urgency)
  2598. CVE-2017-17122 binutils (remotely exploitable, medium urgency)
  2599. CVE-2017-17123 binutils (remotely exploitable, medium urgency)
  2600. CVE-2017-17124 binutils (remotely exploitable, medium urgency)
  2601. CVE-2017-17125 binutils (remotely exploitable, medium urgency)
  2602. CVE-2017-17126 binutils (remotely exploitable, medium urgency)
  2603. CVE-2017-9038 binutils (remotely exploitable, low urgency)
  2604. CVE-2017-9039 binutils (remotely exploitable, low urgency)
  2605. CVE-2017-9040 binutils (remotely exploitable, low urgency)
  2606. CVE-2017-9041 binutils (remotely exploitable, low urgency)
  2607. CVE-2017-9042 binutils (remotely exploitable, low urgency)
  2608. CVE-2017-9043 binutils (remotely exploitable, low urgency)
  2609. CVE-2017-9044 binutils (remotely exploitable, low urgency)
  2610. CVE-2017-9742 binutils (remotely exploitable, low urgency)
  2611. CVE-2017-9743 binutils (remotely exploitable, low urgency)
  2612. CVE-2017-9744 binutils (remotely exploitable, low urgency)
  2613. CVE-2017-9745 binutils (remotely exploitable, low urgency)
  2614. CVE-2017-9746 binutils (remotely exploitable, low urgency)
  2615. CVE-2017-9747 binutils (remotely exploitable, low urgency)
  2616. CVE-2017-9748 binutils (remotely exploitable, low urgency)
  2617. CVE-2017-9749 binutils (remotely exploitable, low urgency)
  2618. CVE-2017-9750 binutils (remotely exploitable, low urgency)
  2619. CVE-2017-9751 binutils (remotely exploitable, low urgency)
  2620. CVE-2017-9752 binutils (remotely exploitable, low urgency)
  2621. CVE-2017-9753 binutils (remotely exploitable, low urgency)
  2622. CVE-2017-9754 binutils (remotely exploitable, low urgency)
  2623. CVE-2017-9755 binutils (remotely exploitable, low urgency)
  2624. CVE-2017-9756 binutils (remotely exploitable, low urgency)
  2625. CVE-2017-9954 binutils (remotely exploitable, medium urgency)
  2626. CVE-2017-9955 binutils (remotely exploitable, medium urgency)
  2627. CVE-2018-10372 binutils (remotely exploitable, medium urgency)
  2628. CVE-2018-10373 binutils (remotely exploitable, medium urgency)
  2629. CVE-2018-10534 binutils (remotely exploitable, medium urgency)
  2630. CVE-2018-10535 binutils (remotely exploitable, medium urgency)
  2631. CVE-2018-12641 binutils (low urgency)
  2632. CVE-2018-12697 binutils (low urgency)
  2633. CVE-2018-12698 binutils (low urgency)
  2634. CVE-2018-12699 binutils (low urgency)
  2635. CVE-2018-12700 binutils (low urgency)
  2636. CVE-2018-12934 binutils (low urgency)
  2637. CVE-2018-13033 binutils (low urgency)
  2638. CVE-2018-6323 binutils (remotely exploitable, medium urgency)
  2639. CVE-2018-6543 binutils (remotely exploitable, medium urgency)
  2640. CVE-2018-6759 binutils (remotely exploitable, medium urgency)
  2641. CVE-2018-6872 binutils (remotely exploitable, medium urgency)
  2642. CVE-2018-7208 binutils (remotely exploitable, medium urgency)
  2643. CVE-2018-7568 binutils (remotely exploitable, medium urgency)
  2644. CVE-2018-7569 binutils (remotely exploitable, medium urgency)
  2645. CVE-2018-7570 binutils (remotely exploitable, medium urgency)
  2646. CVE-2018-7642 binutils (remotely exploitable, medium urgency)
  2647. CVE-2018-7643 binutils (remotely exploitable, medium urgency)
  2648. CVE-2018-8945 binutils (remotely exploitable, low urgency)
  2649. CVE-2018-9138 binutils (remotely exploitable, low urgency)
  2650. CVE-2018-9996 binutils (remotely exploitable, low urgency)
  2651. CVE-2017-18198 libcdio-paranoia1 (remotely exploitable, low urgency)
  2652. CVE-2017-18199 libcdio-paranoia1 (remotely exploitable, low urgency)
  2653. CVE-2016-10228 libc-dev-bin (remotely exploitable, medium urgency)
  2654. CVE-2017-1000408 libc-dev-bin (high urgency)
  2655. CVE-2017-1000409 libc-dev-bin (medium urgency)
  2656. CVE-2017-12132 libc-dev-bin (remotely exploitable, medium urgency)
  2657. CVE-2017-15670 libc-dev-bin (remotely exploitable, high urgency)
  2658. CVE-2017-15671 libc-dev-bin (remotely exploitable, medium urgency)
  2659. CVE-2017-15804 libc-dev-bin (remotely exploitable, low urgency)
  2660. CVE-2017-16997 libc-dev-bin (remotely exploitable, high urgency)
  2661. CVE-2017-18269 libc-dev-bin (remotely exploitable, high urgency)
  2662. CVE-2018-1000001 libc-dev-bin (high urgency)
  2663. CVE-2018-11236 libc-dev-bin (remotely exploitable, low urgency)
  2664. CVE-2018-11237 libc-dev-bin (low urgency)
  2665. CVE-2018-6485 libc-dev-bin (remotely exploitable, high urgency)
  2666. CVE-2018-6551 libc-dev-bin (remotely exploitable, high urgency)
  2667. CVE-2017-17446 libgme0 (remotely exploitable, medium urgency)
  2668. CVE-2016-10040 qt5-gtk-platformtheme (remotely exploitable, medium urgency)
  2669. CVE-2018-14048 libpng-dev
  2670. CVE-2017-10268 mariadb-server (low urgency)
  2671. CVE-2017-10378 mariadb-server (remotely exploitable, medium urgency)
  2672. CVE-2017-15365 mariadb-server (remotely exploitable, medium urgency)
  2673. CVE-2017-3636 mariadb-server (medium urgency)
  2674. CVE-2017-3641 mariadb-server (remotely exploitable, medium urgency)
  2675. CVE-2017-3653 mariadb-server (remotely exploitable, low urgency)
  2676. CVE-2018-2562 mariadb-server (remotely exploitable, high urgency)
  2677. CVE-2018-2612 mariadb-server (remotely exploitable, high urgency)
  2678. CVE-2018-2622 mariadb-server (remotely exploitable, medium urgency)
  2679. CVE-2018-2640 mariadb-server (remotely exploitable, medium urgency)
  2680. CVE-2018-2665 mariadb-server (remotely exploitable, medium urgency)
  2681. CVE-2018-2668 mariadb-server (remotely exploitable, medium urgency)
  2682. CVE-2018-2755 mariadb-server (low urgency)
  2683. CVE-2018-2761 mariadb-server (remotely exploitable, medium urgency)
  2684. CVE-2018-2766 mariadb-server (remotely exploitable, medium urgency)
  2685. CVE-2018-2767 mariadb-server (remotely exploitable, low urgency)
  2686. CVE-2018-2771 mariadb-server (remotely exploitable, low urgency)
  2687. CVE-2018-2781 mariadb-server (remotely exploitable, medium urgency)
  2688. CVE-2018-2782 mariadb-server (remotely exploitable, medium urgency)
  2689. CVE-2018-2784 mariadb-server (remotely exploitable, medium urgency)
  2690. CVE-2018-2787 mariadb-server (remotely exploitable, medium urgency)
  2691. CVE-2018-2813 mariadb-server (remotely exploitable, medium urgency)
  2692. CVE-2018-2817 mariadb-server (remotely exploitable, medium urgency)
  2693. CVE-2018-2819 mariadb-server (remotely exploitable, medium urgency)
  2694. CVE-2018-3081 mariadb-server (remotely exploitable, medium urgency)
  2695. CVE-2016-2779 libmount1 (high urgency)
  2696. CVE-2017-7272 php7.0-common (remotely exploitable, medium urgency)
  2697. CVE-2017-8923 php7.0-common (remotely exploitable, high urgency)
  2698. CVE-2017-14160 libvorbisenc2 (remotely exploitable, medium urgency)
  2699. CVE-2018-10392 libvorbisenc2 (remotely exploitable, medium urgency)
  2700. CVE-2018-10393 libvorbisenc2 (remotely exploitable, medium urgency)
  2701. CVE-2018-14044 libsoundtouch1 (low urgency)
  2702. CVE-2018-14045 libsoundtouch1 (low urgency)
  2703. CVE-2016-1516 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2704. CVE-2016-1517 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2705. CVE-2017-1000450 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2706. CVE-2017-12597 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2707. CVE-2017-12598 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2708. CVE-2017-12599 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2709. CVE-2017-12600 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
  2710. CVE-2017-12601 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2711. CVE-2017-12602 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
  2712. CVE-2017-12603 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2713. CVE-2017-12604 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2714. CVE-2017-12605 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2715. CVE-2017-12606 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2716. CVE-2017-12862 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2717. CVE-2017-12863 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2718. CVE-2017-12864 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2719. CVE-2017-17760 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2720. CVE-2018-5268 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2721. CVE-2018-5269 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  2722. CVE-2018-7712 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  2723. CVE-2018-7713 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  2724. CVE-2018-7714 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  2725. CVE-2016-1516 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2726. CVE-2016-1517 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2727. CVE-2017-1000450 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2728. CVE-2017-12597 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2729. CVE-2017-12598 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2730. CVE-2017-12599 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2731. CVE-2017-12600 libopencv-flann2.4v5 (remotely exploitable, high urgency)
  2732. CVE-2017-12601 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2733. CVE-2017-12602 libopencv-flann2.4v5 (remotely exploitable, high urgency)
  2734. CVE-2017-12603 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2735. CVE-2017-12604 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2736. CVE-2017-12605 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2737. CVE-2017-12606 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2738. CVE-2017-12862 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2739. CVE-2017-12863 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2740. CVE-2017-12864 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2741. CVE-2017-17760 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2742. CVE-2018-5268 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2743. CVE-2018-5269 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  2744. CVE-2018-7712 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  2745. CVE-2018-7713 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  2746. CVE-2018-7714 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  2747. CVE-2017-12424 login (remotely exploitable, high urgency)
  2748. CVE-2018-7169 login (remotely exploitable, medium urgency)
  2749. CVE-2018-9234 gnupg-agent (remotely exploitable, low urgency)
  2750. CVE-2017-7272 php7.0-xml (remotely exploitable, medium urgency)
  2751. CVE-2017-8923 php7.0-xml (remotely exploitable, high urgency)
  2752. CVE-2017-7697 libsamplerate0 (remotely exploitable, medium urgency)
  2753. CVE-2016-1516 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2754. CVE-2016-1517 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2755. CVE-2017-1000450 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2756. CVE-2017-12597 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2757. CVE-2017-12598 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2758. CVE-2017-12599 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2759. CVE-2017-12600 libopencv-video2.4v5 (remotely exploitable, high urgency)
  2760. CVE-2017-12601 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2761. CVE-2017-12602 libopencv-video2.4v5 (remotely exploitable, high urgency)
  2762. CVE-2017-12603 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2763. CVE-2017-12604 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2764. CVE-2017-12605 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2765. CVE-2017-12606 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2766. CVE-2017-12862 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2767. CVE-2017-12863 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2768. CVE-2017-12864 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2769. CVE-2017-17760 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2770. CVE-2018-5268 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2771. CVE-2018-5269 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  2772. CVE-2018-7712 libopencv-video2.4v5 (remotely exploitable, low urgency)
  2773. CVE-2018-7713 libopencv-video2.4v5 (remotely exploitable, low urgency)
  2774. CVE-2018-7714 libopencv-video2.4v5 (remotely exploitable, low urgency)
  2775. CVE-2018-1000030 libpython2.7-minimal (remotely exploitable, medium urgency)
  2776. CVE-2018-1060 libpython2.7-minimal (low urgency)
  2777. CVE-2018-1061 libpython2.7-minimal (low urgency)
  2778. CVE-2017-10268 mariadb-server-10.1 (low urgency)
  2779. CVE-2017-10378 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2780. CVE-2017-15365 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2781. CVE-2017-3636 mariadb-server-10.1 (medium urgency)
  2782. CVE-2017-3641 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2783. CVE-2017-3653 mariadb-server-10.1 (remotely exploitable, low urgency)
  2784. CVE-2018-2562 mariadb-server-10.1 (remotely exploitable, high urgency)
  2785. CVE-2018-2612 mariadb-server-10.1 (remotely exploitable, high urgency)
  2786. CVE-2018-2622 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2787. CVE-2018-2640 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2788. CVE-2018-2665 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2789. CVE-2018-2668 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2790. CVE-2018-2755 mariadb-server-10.1 (low urgency)
  2791. CVE-2018-2761 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2792. CVE-2018-2766 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2793. CVE-2018-2767 mariadb-server-10.1 (remotely exploitable, low urgency)
  2794. CVE-2018-2771 mariadb-server-10.1 (remotely exploitable, low urgency)
  2795. CVE-2018-2781 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2796. CVE-2018-2782 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2797. CVE-2018-2784 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2798. CVE-2018-2787 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2799. CVE-2018-2813 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2800. CVE-2018-2817 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2801. CVE-2018-2819 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2802. CVE-2018-3081 mariadb-server-10.1 (remotely exploitable, medium urgency)
  2803. CVE-2017-7272 php7.0-intl (remotely exploitable, medium urgency)
  2804. CVE-2017-8923 php7.0-intl (remotely exploitable, high urgency)
  2805. CVE-2017-14160 libvorbis0a (remotely exploitable, medium urgency)
  2806. CVE-2018-10392 libvorbis0a (remotely exploitable, medium urgency)
  2807. CVE-2018-10393 libvorbis0a (remotely exploitable, medium urgency)
  2808. CVE-2018-1060 python3.5-dev (low urgency)
  2809. CVE-2018-1061 python3.5-dev (low urgency)
  2810. CVE-2002-2439 gcc-4.7-base (low urgency)
  2811. CVE-2014-5044 gcc-4.7-base (remotely exploitable, high urgency)
  2812. CVE-2017-11671 gcc-4.7-base (low urgency)
  2813. CVE-2002-2439 gcc-4.6-base (low urgency)
  2814. CVE-2014-5044 gcc-4.6-base (remotely exploitable, high urgency)
  2815. CVE-2017-11671 gcc-4.6-base (low urgency)
  2816. CVE-2016-9811 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  2817. CVE-2017-5837 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  2818. CVE-2017-5844 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  2819. CVE-2018-10754 ncurses-bin (remotely exploitable, low urgency)
  2820. CVE-2018-9234 dirmngr (remotely exploitable, low urgency)
  2821. CVE-2017-10683 libmpg123-0 (remotely exploitable, medium urgency)
  2822. CVE-2017-12797 libmpg123-0 (remotely exploitable, medium urgency)
  2823. CVE-2017-9545 libmpg123-0 (remotely exploitable, low urgency)
  2824. CVE-2016-9797 bluez (remotely exploitable, medium urgency)
  2825. CVE-2016-9798 bluez (remotely exploitable, medium urgency)
  2826. CVE-2016-9799 bluez (remotely exploitable, medium urgency)
  2827. CVE-2016-9800 bluez (remotely exploitable, medium urgency)
  2828. CVE-2016-9801 bluez (remotely exploitable, medium urgency)
  2829. CVE-2016-9802 bluez (remotely exploitable, medium urgency)
  2830. CVE-2016-9803 bluez (remotely exploitable, medium urgency)
  2831. CVE-2016-9804 bluez (remotely exploitable, medium urgency)
  2832. CVE-2016-9917 bluez (remotely exploitable, medium urgency)
  2833. CVE-2016-9918 bluez (remotely exploitable, medium urgency)
  2834. CVE-2017-1000250 bluez (remotely exploitable, low urgency)
  2835. CVE-2018-10910 bluez
  2836. CVE-2016-10317 libgs9 (remotely exploitable, medium urgency)
  2837. CVE-2018-10194 libgs9 (remotely exploitable, medium urgency)
  2838. CVE-2018-11645 libgs9 (remotely exploitable, low urgency)
  2839. CVE-2017-11399 libavformat57 (remotely exploitable, medium urgency)
  2840. CVE-2017-11665 libavformat57 (remotely exploitable, medium urgency)
  2841. CVE-2017-11719 libavformat57 (remotely exploitable, medium urgency)
  2842. CVE-2017-14054 libavformat57 (remotely exploitable, high urgency)
  2843. CVE-2017-14055 libavformat57 (remotely exploitable, high urgency)
  2844. CVE-2017-14056 libavformat57 (remotely exploitable, high urgency)
  2845. CVE-2017-14057 libavformat57 (remotely exploitable, high urgency)
  2846. CVE-2017-14058 libavformat57 (remotely exploitable, medium urgency)
  2847. CVE-2017-14059 libavformat57 (remotely exploitable, high urgency)
  2848. CVE-2017-14169 libavformat57 (remotely exploitable, medium urgency)
  2849. CVE-2017-14170 libavformat57 (remotely exploitable, high urgency)
  2850. CVE-2017-14171 libavformat57 (remotely exploitable, high urgency)
  2851. CVE-2017-14222 libavformat57 (remotely exploitable, high urgency)
  2852. CVE-2017-14223 libavformat57 (remotely exploitable, high urgency)
  2853. CVE-2017-14225 libavformat57 (remotely exploitable, medium urgency)
  2854. CVE-2017-14767 libavformat57 (remotely exploitable, medium urgency)
  2855. CVE-2017-15186 libavformat57 (remotely exploitable, medium urgency)
  2856. CVE-2017-15672 libavformat57 (remotely exploitable, medium urgency)
  2857. CVE-2017-16840 libavformat57 (remotely exploitable, high urgency)
  2858. CVE-2017-17081 libavformat57 (remotely exploitable, medium urgency)
  2859. CVE-2017-9608 libavformat57 (remotely exploitable, medium urgency)
  2860. CVE-2018-10001 libavformat57 (remotely exploitable, medium urgency)
  2861. CVE-2018-12458 libavformat57 (low urgency)
  2862. CVE-2018-12459 libavformat57 (low urgency)
  2863. CVE-2018-13300 libavformat57 (remotely exploitable, medium urgency)
  2864. CVE-2018-13301 libavformat57 (remotely exploitable, low urgency)
  2865. CVE-2018-13302 libavformat57 (remotely exploitable, medium urgency)
  2866. CVE-2018-13303 libavformat57 (remotely exploitable, medium urgency)
  2867. CVE-2018-13304 libavformat57 (remotely exploitable, medium urgency)
  2868. CVE-2018-13305 libavformat57 (remotely exploitable, medium urgency)
  2869. CVE-2018-14394 libavformat57
  2870. CVE-2018-14395 libavformat57
  2871. CVE-2018-1999010 libavformat57
  2872. CVE-2018-1999011 libavformat57
  2873. CVE-2018-1999012 libavformat57
  2874. CVE-2018-1999013 libavformat57
  2875. CVE-2018-6392 libavformat57 (remotely exploitable, medium urgency)
  2876. CVE-2018-6621 libavformat57 (remotely exploitable, medium urgency)
  2877. CVE-2018-6912 libavformat57 (remotely exploitable, low urgency)
  2878. CVE-2018-7557 libavformat57 (remotely exploitable, medium urgency)
  2879. CVE-2018-7751 libavformat57 (remotely exploitable, medium urgency)
  2880. CVE-2018-9841 libavformat57 (remotely exploitable, low urgency)
  2881. CVE-2016-10228 libc6-dev (remotely exploitable, medium urgency)
  2882. CVE-2017-1000408 libc6-dev (high urgency)
  2883. CVE-2017-1000409 libc6-dev (medium urgency)
  2884. CVE-2017-12132 libc6-dev (remotely exploitable, medium urgency)
  2885. CVE-2017-15670 libc6-dev (remotely exploitable, high urgency)
  2886. CVE-2017-15671 libc6-dev (remotely exploitable, medium urgency)
  2887. CVE-2017-15804 libc6-dev (remotely exploitable, low urgency)
  2888. CVE-2017-16997 libc6-dev (remotely exploitable, high urgency)
  2889. CVE-2017-18269 libc6-dev (remotely exploitable, high urgency)
  2890. CVE-2018-1000001 libc6-dev (high urgency)
  2891. CVE-2018-11236 libc6-dev (remotely exploitable, low urgency)
  2892. CVE-2018-11237 libc6-dev (low urgency)
  2893. CVE-2018-6485 libc6-dev (remotely exploitable, high urgency)
  2894. CVE-2018-6551 libc6-dev (remotely exploitable, high urgency)
  2895. CVE-2016-10517 redis-server (remotely exploitable, medium urgency)
  2896. CVE-2017-9525 cron (medium urgency)
  2897. CVE-2018-1000030 python2.7-dev (remotely exploitable, medium urgency)
  2898. CVE-2018-1060 python2.7-dev (low urgency)
  2899. CVE-2018-1061 python2.7-dev (low urgency)
  2900. CVE-2016-6328 libexif12
  2901. CVE-2017-7544 libexif12 (remotely exploitable, medium urgency)
  2902. CVE-2017-16612 libwayland-cursor0 (remotely exploitable, medium urgency)
  2903. CVE-2016-10228 locales (remotely exploitable, medium urgency)
  2904. CVE-2017-1000408 locales (high urgency)
  2905. CVE-2017-1000409 locales (medium urgency)
  2906. CVE-2017-12132 locales (remotely exploitable, medium urgency)
  2907. CVE-2017-15670 locales (remotely exploitable, high urgency)
  2908. CVE-2017-15671 locales (remotely exploitable, medium urgency)
  2909. CVE-2017-15804 locales (remotely exploitable, low urgency)
  2910. CVE-2017-16997 locales (remotely exploitable, high urgency)
  2911. CVE-2017-18269 locales (remotely exploitable, high urgency)
  2912. CVE-2018-1000001 locales (high urgency)
  2913. CVE-2018-11236 locales (remotely exploitable, low urgency)
  2914. CVE-2018-11237 locales (low urgency)
  2915. CVE-2018-6485 locales (remotely exploitable, high urgency)
  2916. CVE-2018-6551 locales (remotely exploitable, high urgency)
  2917. CVE-2016-1516 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2918. CVE-2016-1517 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2919. CVE-2017-1000450 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2920. CVE-2017-12597 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2921. CVE-2017-12598 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2922. CVE-2017-12599 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2923. CVE-2017-12600 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
  2924. CVE-2017-12601 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2925. CVE-2017-12602 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
  2926. CVE-2017-12603 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2927. CVE-2017-12604 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2928. CVE-2017-12605 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2929. CVE-2017-12606 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2930. CVE-2017-12862 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2931. CVE-2017-12863 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2932. CVE-2017-12864 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2933. CVE-2017-17760 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2934. CVE-2018-5268 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2935. CVE-2018-5269 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  2936. CVE-2018-7712 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  2937. CVE-2018-7713 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  2938. CVE-2018-7714 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  2939. CVE-2016-10040 libqt5concurrent5 (remotely exploitable, medium urgency)
  2940. CVE-2018-1000030 libpython2.7-stdlib (remotely exploitable, medium urgency)
  2941. CVE-2018-1060 libpython2.7-stdlib (low urgency)
  2942. CVE-2018-1061 libpython2.7-stdlib (low urgency)
  2943. CVE-2017-14062 libidn11 (remotely exploitable, high urgency)
  2944. CVE-2018-10906 fuse
  2945. CVE-2016-2568 libpolkit-gobject-1-0 (medium urgency)
  2946. CVE-2018-1116 libpolkit-gobject-1-0
  2947. CVE-2016-2779 util-linux (high urgency)
  2948. CVE-2017-12678 libtag1v5-vanilla (remotely exploitable, medium urgency)
  2949. CVE-2018-11439 libtag1v5-vanilla (remotely exploitable, medium urgency)
  2950. CVE-2017-11671 gcc-5-base (low urgency)
  2951. CVE-2018-1000030 python2.7-minimal (remotely exploitable, medium urgency)
  2952. CVE-2018-1060 python2.7-minimal (low urgency)
  2953. CVE-2018-1061 python2.7-minimal (low urgency)
  2954. CVE-2018-1060 libpython3.5-minimal (low urgency)
  2955. CVE-2018-1061 libpython3.5-minimal (low urgency)
  2956. CVE-2017-15400 libcups2 (remotely exploitable, high urgency)
  2957. CVE-2017-18190 libcups2 (remotely exploitable, medium urgency)
  2958. CVE-2017-18248 libcups2 (remotely exploitable, low urgency)
  2959. CVE-2018-4180 libcups2
  2960. CVE-2018-4181 libcups2
  2961. CVE-2018-6553 libcups2
  2962. CVE-2016-2779 libsmartcols1 (high urgency)
  2963. CVE-2017-12618 libaprutil1-ldap (low urgency)
  2964. CVE-2017-16612 libwayland-server0 (remotely exploitable, medium urgency)
  2965.  
  2966. [ nc-limits ]
  2967. Using 729179136B for PHP
  2968. Using 4 PHP threads
  2969. Using 729179136B for Redis
  2970.  
  2971. [ no-ip ]
  2972.  
  2973. Auto configuration for Linux client of no-ip.com.
  2974.  
  2975. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  2976. It will be used.
  2977.  
  2978. New configuration file '/usr/local/etc/no-ip2.conf' created.
  2979.  
  2980. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  2981. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  2982. noip DDNS enabled
  2983.  
  2984. [ nc-webui ]
  2985. Site ncp already enabled
  2986. ncp-web enabled
  2987.  
  2988. [ nc-forward-ports ]
  2989. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  2990. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  2991. for more information.
  2992. List of UPNP devices found on the network :
  2993. desc: http://192.168.0.1:5000/rootDesc.xml
  2994. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  2995.  
  2996. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  2997. Trying to continue anyway
  2998. Local LAN ip address : 192.168.0.199
  2999. UPNP_DeletePortMapping() returned : 0
  3000. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3001. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3002. for more information.
  3003. List of UPNP devices found on the network :
  3004. desc: http://192.168.0.1:5000/rootDesc.xml
  3005. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3006.  
  3007. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3008. Trying to continue anyway
  3009. Local LAN ip address : 192.168.0.199
  3010. UPNP_DeletePortMapping() returned : 0
  3011. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3012. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3013. for more information.
  3014. List of UPNP devices found on the network :
  3015. desc: http://192.168.0.1:5000/rootDesc.xml
  3016. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3017.  
  3018. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3019. Trying to continue anyway
  3020. Local LAN ip address : 192.168.0.199
  3021. ExternalIPAddress = 0.0.0.0
  3022. InternalIP:Port = 192.168.0.199:443
  3023. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  3024. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3025. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3026. for more information.
  3027. List of UPNP devices found on the network :
  3028. desc: http://192.168.0.1:5000/rootDesc.xml
  3029. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3030.  
  3031. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3032. Trying to continue anyway
  3033. Local LAN ip address : 192.168.0.199
  3034. ExternalIPAddress = 0.0.0.0
  3035. InternalIP:Port = 192.168.0.199:80
  3036. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  3037.  
  3038. [ no-ip ]
  3039.  
  3040. Auto configuration for Linux client of no-ip.com.
  3041.  
  3042. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3043. It will be used.
  3044.  
  3045. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3046.  
  3047. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3048. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3049. noip DDNS enabled
  3050.  
  3051. [ nc-limits ]
  3052. Using 729179136B for PHP
  3053. Using 4 PHP threads
  3054. Using 729179136B for Redis
  3055.  
  3056. [ nc-limits ]
  3057. Using 729179136B for PHP
  3058. Using 4 PHP threads
  3059. Using 729179136B for Redis
  3060.  
  3061. [ nc-limits ]
  3062. Using 729179136B for PHP
  3063. Using 4 PHP threads
  3064. Using 729179136B for Redis
  3065.  
  3066. [ nc-limits ]
  3067. Using 729179136B for PHP
  3068. Using 4 PHP threads
  3069. Using 729179136B for Redis
  3070.  
  3071. [ nc-limits ]
  3072. Using 729179136B for PHP
  3073. Using 4 PHP threads
  3074. Using 729179136B for Redis
  3075.  
  3076. [ nc-limits ]
  3077. Using 729179136B for PHP
  3078. Using 4 PHP threads
  3079. Using 729179136B for Redis
  3080.  
  3081. [ nc-limits ]
  3082. Using 729179136B for PHP
  3083. Using 4 PHP threads
  3084. Using 729179136B for Redis
  3085.  
  3086. [ no-ip ]
  3087.  
  3088. Auto configuration for Linux client of no-ip.com.
  3089.  
  3090. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3091. It will be used.
  3092.  
  3093. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3094.  
  3095. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3096. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3097. noip DDNS enabled
  3098.  
  3099. [ no-ip ]
  3100.  
  3101. Auto configuration for Linux client of no-ip.com.
  3102.  
  3103. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3104. It will be used.
  3105.  
  3106. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3107.  
  3108. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3109. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3110. noip DDNS enabled
  3111.  
  3112. [ unattended-upgrades ]
  3113. Unattended upgrades active: yes (autoreboot yes)
  3114.  
  3115. [ nc-autoupdate-ncp ]
  3116. automatic NextCloudPi updates enabled
  3117.  
  3118. [ nc-autoupdate-nc ]
  3119. automatic Nextcloud updates enabled
  3120.  
  3121. [ nc-forward-ports ]
  3122. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3123. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3124. for more information.
  3125. List of UPNP devices found on the network :
  3126. desc: http://192.168.0.1:5000/rootDesc.xml
  3127. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3128.  
  3129. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3130. Trying to continue anyway
  3131. Local LAN ip address : 192.168.0.2
  3132. UPNP_DeletePortMapping() returned : 606
  3133. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3134. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3135. for more information.
  3136. List of UPNP devices found on the network :
  3137. desc: http://192.168.0.1:5000/rootDesc.xml
  3138. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3139.  
  3140. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3141. Trying to continue anyway
  3142. Local LAN ip address : 192.168.0.2
  3143. UPNP_DeletePortMapping() returned : 606
  3144. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3145. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3146. for more information.
  3147. List of UPNP devices found on the network :
  3148. desc: http://192.168.0.1:5000/rootDesc.xml
  3149. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3150.  
  3151. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3152. Trying to continue anyway
  3153. Local LAN ip address : 192.168.0.2
  3154. ExternalIPAddress = 0.0.0.0
  3155. AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3156. InternalIP:Port = 192.168.0.199:443
  3157. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  3158. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3159. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3160. for more information.
  3161. List of UPNP devices found on the network :
  3162. desc: http://192.168.0.1:5000/rootDesc.xml
  3163. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3164.  
  3165. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3166. Trying to continue anyway
  3167. Local LAN ip address : 192.168.0.2
  3168. ExternalIPAddress = 0.0.0.0
  3169. AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3170. InternalIP:Port = 192.168.0.199:80
  3171. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  3172.  
  3173. [ nc-forward-ports ]
  3174. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3175. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3176. for more information.
  3177. List of UPNP devices found on the network :
  3178. desc: http://192.168.0.1:5000/rootDesc.xml
  3179. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3180.  
  3181. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3182. Trying to continue anyway
  3183. Local LAN ip address : 192.168.0.2
  3184. UPNP_DeletePortMapping() returned : 606
  3185. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3186. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3187. for more information.
  3188. List of UPNP devices found on the network :
  3189. desc: http://192.168.0.1:5000/rootDesc.xml
  3190. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3191.  
  3192. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3193. Trying to continue anyway
  3194. Local LAN ip address : 192.168.0.2
  3195. UPNP_DeletePortMapping() returned : 606
  3196. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3197. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3198. for more information.
  3199. List of UPNP devices found on the network :
  3200. desc: http://192.168.0.1:5000/rootDesc.xml
  3201. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3202.  
  3203. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3204. Trying to continue anyway
  3205. Local LAN ip address : 192.168.0.2
  3206. ExternalIPAddress = 0.0.0.0
  3207. AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3208. InternalIP:Port = 192.168.0.199:443
  3209. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  3210. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3211. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3212. for more information.
  3213. List of UPNP devices found on the network :
  3214. desc: http://192.168.0.1:5000/rootDesc.xml
  3215. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3216.  
  3217. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3218. Trying to continue anyway
  3219. Local LAN ip address : 192.168.0.2
  3220. ExternalIPAddress = 0.0.0.0
  3221. AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3222. InternalIP:Port = 192.168.0.199:80
  3223. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  3224.  
  3225. [ nc-forward-ports ]
  3226. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3227. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3228. for more information.
  3229. List of UPNP devices found on the network :
  3230. desc: http://192.168.0.1:5000/rootDesc.xml
  3231. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3232.  
  3233. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3234. Trying to continue anyway
  3235. Local LAN ip address : 192.168.0.2
  3236. UPNP_DeletePortMapping() returned : 606
  3237. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3238. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3239. for more information.
  3240. List of UPNP devices found on the network :
  3241. desc: http://192.168.0.1:5000/rootDesc.xml
  3242. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3243.  
  3244. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3245. Trying to continue anyway
  3246. Local LAN ip address : 192.168.0.2
  3247. UPNP_DeletePortMapping() returned : 606
  3248. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3249. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3250. for more information.
  3251. List of UPNP devices found on the network :
  3252. desc: http://192.168.0.1:5000/rootDesc.xml
  3253. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3254.  
  3255. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3256. Trying to continue anyway
  3257. Local LAN ip address : 192.168.0.2
  3258. ExternalIPAddress = 0.0.0.0
  3259. AddPortMapping(443, 443, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3260. InternalIP:Port = 192.168.0.199:443
  3261. external 0.0.0.0:443 TCP is redirected to internal 192.168.0.199:443 (duration=0)
  3262. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3263. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3264. for more information.
  3265. List of UPNP devices found on the network :
  3266. desc: http://192.168.0.1:5000/rootDesc.xml
  3267. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3268.  
  3269. Found a (not connected?) IGD : http://192.168.0.1:5000/ctl/IPConn
  3270. Trying to continue anyway
  3271. Local LAN ip address : 192.168.0.2
  3272. ExternalIPAddress = 0.0.0.0
  3273. AddPortMapping(80, 80, 192.168.0.2) failed with code 718 (ConflictInMappingEntry)
  3274. InternalIP:Port = 192.168.0.199:80
  3275. external 0.0.0.0:80 TCP is redirected to internal 192.168.0.199:80 (duration=0)
  3276.  
  3277. [ no-ip ]
  3278.  
  3279. Auto configuration for Linux client of no-ip.com.
  3280.  
  3281. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3282. It will be used.
  3283.  
  3284. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3285.  
  3286. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3287. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3288. noip DDNS enabled
  3289.  
  3290. [ nc-limits ]
  3291. Using 729179136B for PHP
  3292. Using 4 PHP threads
  3293. Using 729179136B for Redis
  3294.  
  3295. [ nc-limits ]
  3296. Using 729179136B for PHP
  3297. Using 4 PHP threads
  3298. Using 729179136B for Redis
  3299.  
  3300. [ nc-limits ]
  3301. Using 729179136B for PHP
  3302. Using 4 PHP threads
  3303. Using 729179136B for Redis
  3304.  
  3305. [ no-ip ]
  3306.  
  3307. [ no-ip ]
  3308.  
  3309. Auto configuration for Linux client of no-ip.com.
  3310.  
  3311. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3312. It will be used.
  3313.  
  3314. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3315.  
  3316. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3317. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3318. noip DDNS enabled
  3319.  
  3320. [ nc-limits ]
  3321. Using 729179136B for PHP
  3322. Using 4 PHP threads
  3323. Using 729179136B for Redis
  3324.  
  3325. [ no-ip ]
  3326.  
  3327. Auto configuration for Linux client of no-ip.com.
  3328.  
  3329. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3330. It will be used.
  3331.  
  3332. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3333.  
  3334. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3335. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3336. noip DDNS enabled
  3337.  
  3338. [ no-ip ]
  3339.  
  3340. Auto configuration for Linux client of no-ip.com.
  3341.  
  3342. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3343. It will be used.
  3344.  
  3345. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3346.  
  3347. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3348. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3349. noip DDNS enabled
  3350.  
  3351. [ nc-forward-ports ]
  3352. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3353. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3354. for more information.
  3355. List of UPNP devices found on the network :
  3356. desc: http://192.168.0.1:49000/l2tpv3.xml
  3357. st: upnp:rootdevice
  3358.  
  3359. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3360. Trying to continue anyway
  3361. Local LAN ip address : 192.168.0.5
  3362. UPNP_DeletePortMapping() returned : 401
  3363. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3364. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3365. for more information.
  3366. List of UPNP devices found on the network :
  3367. desc: http://192.168.0.1:49000/l2tpv3.xml
  3368. st: upnp:rootdevice
  3369.  
  3370. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3371. Trying to continue anyway
  3372. Local LAN ip address : 192.168.0.5
  3373. UPNP_DeletePortMapping() returned : 401
  3374. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3375. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3376. for more information.
  3377. List of UPNP devices found on the network :
  3378. desc: http://192.168.0.1:49000/l2tpv3.xml
  3379. st: upnp:rootdevice
  3380.  
  3381. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3382. Trying to continue anyway
  3383. Local LAN ip address : 192.168.0.5
  3384. GetExternalIPAddress failed.
  3385. AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
  3386. GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
  3387.  
  3388. Could not forward ports automatically.
  3389. Do it manually, or activate UPnP in your router and try again
  3390.  
  3391. [ no-ip ]
  3392.  
  3393. Auto configuration for Linux client of no-ip.com.
  3394.  
  3395. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3396. It will be used.
  3397.  
  3398. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3399.  
  3400. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3401. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3402. noip DDNS enabled
  3403.  
  3404. [ nc-forward-ports ]
  3405. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3406. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3407. for more information.
  3408. List of UPNP devices found on the network :
  3409. desc: http://192.168.0.1:49000/l2tpv3.xml
  3410. st: upnp:rootdevice
  3411.  
  3412. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3413. Trying to continue anyway
  3414. Local LAN ip address : 192.168.0.5
  3415. UPNP_DeletePortMapping() returned : 401
  3416. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3417. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3418. for more information.
  3419. List of UPNP devices found on the network :
  3420. desc: http://192.168.0.1:49000/l2tpv3.xml
  3421. st: upnp:rootdevice
  3422.  
  3423. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3424. Trying to continue anyway
  3425. Local LAN ip address : 192.168.0.5
  3426. UPNP_DeletePortMapping() returned : 401
  3427. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3428. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3429. for more information.
  3430. List of UPNP devices found on the network :
  3431. desc: http://192.168.0.1:49000/l2tpv3.xml
  3432. st: upnp:rootdevice
  3433.  
  3434. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3435. Trying to continue anyway
  3436. Local LAN ip address : 192.168.0.5
  3437. GetExternalIPAddress failed.
  3438. AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
  3439. GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
  3440.  
  3441. Could not forward ports automatically.
  3442. Do it manually, or activate UPnP in your router and try again
  3443.  
  3444. [ nc-forward-ports ]
  3445. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3446. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3447. for more information.
  3448. List of UPNP devices found on the network :
  3449. desc: http://192.168.0.1:49000/l2tpv3.xml
  3450. st: upnp:rootdevice
  3451.  
  3452. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3453. Trying to continue anyway
  3454. Local LAN ip address : 192.168.0.5
  3455. UPNP_DeletePortMapping() returned : 401
  3456. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3457. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3458. for more information.
  3459. List of UPNP devices found on the network :
  3460. desc: http://192.168.0.1:49000/l2tpv3.xml
  3461. st: upnp:rootdevice
  3462.  
  3463. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3464. Trying to continue anyway
  3465. Local LAN ip address : 192.168.0.5
  3466. UPNP_DeletePortMapping() returned : 401
  3467. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3468. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3469. for more information.
  3470. List of UPNP devices found on the network :
  3471. desc: http://192.168.0.1:49000/l2tpv3.xml
  3472. st: upnp:rootdevice
  3473.  
  3474. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3475. Trying to continue anyway
  3476. Local LAN ip address : 192.168.0.5
  3477. GetExternalIPAddress failed.
  3478. AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
  3479. GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
  3480.  
  3481. Could not forward ports automatically.
  3482. Do it manually, or activate UPnP in your router and try again
  3483.  
  3484. [ nc-forward-ports ]
  3485. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3486. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3487. for more information.
  3488. List of UPNP devices found on the network :
  3489. desc: http://192.168.0.1:49000/igddesc.xml
  3490. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3491.  
  3492. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3493. Trying to continue anyway
  3494. Local LAN ip address : 192.168.0.5
  3495. UPNP_DeletePortMapping() returned : 714
  3496. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3497. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3498. for more information.
  3499. List of UPNP devices found on the network :
  3500. desc: http://192.168.0.1:49000/igddesc.xml
  3501. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3502.  
  3503. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3504. Trying to continue anyway
  3505. Local LAN ip address : 192.168.0.5
  3506. UPNP_DeletePortMapping() returned : 714
  3507. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3508. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3509. for more information.
  3510. List of UPNP devices found on the network :
  3511. desc: http://192.168.0.1:49000/igddesc.xml
  3512. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3513.  
  3514. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3515. Trying to continue anyway
  3516. Local LAN ip address : 192.168.0.5
  3517. ExternalIPAddress =
  3518. InternalIP:Port = 192.168.0.5:443
  3519. external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
  3520. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3521. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3522. for more information.
  3523. List of UPNP devices found on the network :
  3524. desc: http://192.168.0.1:49000/igddesc.xml
  3525. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3526.  
  3527. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3528. Trying to continue anyway
  3529. Local LAN ip address : 192.168.0.5
  3530. ExternalIPAddress =
  3531. AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3532. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3533.  
  3534. Could not forward ports automatically.
  3535. Do it manually, or activate UPnP in your router and try again
  3536.  
  3537. [ nc-forward-ports ]
  3538. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3539. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3540. for more information.
  3541. List of UPNP devices found on the network :
  3542. desc: http://192.168.0.1:49000/igddesc.xml
  3543. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3544.  
  3545. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3546. Trying to continue anyway
  3547. Local LAN ip address : 192.168.0.5
  3548. UPNP_DeletePortMapping() returned : 0
  3549. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3550. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3551. for more information.
  3552. List of UPNP devices found on the network :
  3553. desc: http://192.168.0.1:49000/igddesc.xml
  3554. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3555.  
  3556. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3557. Trying to continue anyway
  3558. Local LAN ip address : 192.168.0.5
  3559. UPNP_DeletePortMapping() returned : 714
  3560. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3561. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3562. for more information.
  3563. List of UPNP devices found on the network :
  3564. desc: http://192.168.0.1:49000/igddesc.xml
  3565. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3566.  
  3567. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3568. Trying to continue anyway
  3569. Local LAN ip address : 192.168.0.5
  3570. ExternalIPAddress =
  3571. InternalIP:Port = 192.168.0.5:443
  3572. external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
  3573. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3574. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3575. for more information.
  3576. List of UPNP devices found on the network :
  3577. desc: http://192.168.0.1:49000/igddesc.xml
  3578. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3579.  
  3580. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3581. Trying to continue anyway
  3582. Local LAN ip address : 192.168.0.5
  3583. ExternalIPAddress =
  3584. AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3585. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3586.  
  3587. Could not forward ports automatically.
  3588. Do it manually, or activate UPnP in your router and try again
  3589.  
  3590. [ no-ip ]
  3591.  
  3592. Auto configuration for Linux client of no-ip.com.
  3593.  
  3594. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3595. It will be used.
  3596.  
  3597. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3598.  
  3599. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3600. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3601. noip DDNS enabled
  3602.  
  3603. [ nc-limits ]
  3604. Using 729179136B for PHP
  3605. Using 4 PHP threads
  3606. Using 729179136B for Redis
  3607.  
  3608. [ nc-limits ]
  3609. Using 729179136B for PHP
  3610. Using 4 PHP threads
  3611. Using 729179136B for Redis
  3612.  
  3613. [ nc-forward-ports ]
  3614. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3615. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3616. for more information.
  3617. List of UPNP devices found on the network :
  3618. desc: http://192.168.0.1:49000/l2tpv3.xml
  3619. st: upnp:rootdevice
  3620.  
  3621. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3622. Trying to continue anyway
  3623. Local LAN ip address : 192.168.0.5
  3624. UPNP_DeletePortMapping() returned : 401
  3625. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3626. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3627. for more information.
  3628. List of UPNP devices found on the network :
  3629. desc: http://192.168.0.1:49000/l2tpv3.xml
  3630. st: upnp:rootdevice
  3631.  
  3632. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3633. Trying to continue anyway
  3634. Local LAN ip address : 192.168.0.5
  3635. UPNP_DeletePortMapping() returned : 401
  3636. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3637. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3638. for more information.
  3639. List of UPNP devices found on the network :
  3640. desc: http://192.168.0.1:49000/l2tpv3.xml
  3641. st: upnp:rootdevice
  3642.  
  3643. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3644. Trying to continue anyway
  3645. Local LAN ip address : 192.168.0.5
  3646. GetExternalIPAddress failed.
  3647. AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
  3648. GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
  3649.  
  3650. Could not forward ports automatically.
  3651. Do it manually, or activate UPnP in your router and try again
  3652.  
  3653. [ no-ip ]
  3654.  
  3655. Auto configuration for Linux client of no-ip.com.
  3656.  
  3657. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3658. It will be used.
  3659.  
  3660. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3661.  
  3662. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3663. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3664. noip DDNS enabled
  3665.  
  3666. [ nc-forward-ports ]
  3667. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3668. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3669. for more information.
  3670. List of UPNP devices found on the network :
  3671. desc: http://192.168.0.1:49000/igddesc.xml
  3672. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3673.  
  3674. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3675. Trying to continue anyway
  3676. Local LAN ip address : 192.168.0.5
  3677. UPNP_DeletePortMapping() returned : 714
  3678. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3679. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3680. for more information.
  3681. List of UPNP devices found on the network :
  3682. desc: http://192.168.0.1:49000/igddesc.xml
  3683. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3684.  
  3685. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3686. Trying to continue anyway
  3687. Local LAN ip address : 192.168.0.5
  3688. UPNP_DeletePortMapping() returned : 714
  3689. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3690. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3691. for more information.
  3692. List of UPNP devices found on the network :
  3693. desc: http://192.168.0.1:49000/igddesc.xml
  3694. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3695.  
  3696. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3697. Trying to continue anyway
  3698. Local LAN ip address : 192.168.0.5
  3699. ExternalIPAddress =
  3700. InternalIP:Port = 192.168.0.5:443
  3701. external :443 TCP is redirected to internal 192.168.0.5:443 (duration=0)
  3702. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3703. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3704. for more information.
  3705. List of UPNP devices found on the network :
  3706. desc: http://192.168.0.1:49000/igddesc.xml
  3707. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3708.  
  3709. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3710. Trying to continue anyway
  3711. Local LAN ip address : 192.168.0.5
  3712. ExternalIPAddress =
  3713. AddPortMapping(80, 80, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3714. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3715.  
  3716. Could not forward ports automatically.
  3717. Do it manually, or activate UPnP in your router and try again
  3718.  
  3719. [ nc-forward-ports ]
  3720. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3721. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3722. for more information.
  3723. List of UPNP devices found on the network :
  3724. desc: http://192.168.0.1:49000/igddesc.xml
  3725. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3726.  
  3727. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3728. Trying to continue anyway
  3729. Local LAN ip address : 192.168.0.5
  3730. UPNP_DeletePortMapping() returned : 403
  3731. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3732. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3733. for more information.
  3734. List of UPNP devices found on the network :
  3735. desc: http://192.168.0.1:49000/igddesc.xml
  3736. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3737.  
  3738. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3739. Trying to continue anyway
  3740. Local LAN ip address : 192.168.0.5
  3741. UPNP_DeletePortMapping() returned : 403
  3742. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3743. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3744. for more information.
  3745. List of UPNP devices found on the network :
  3746. desc: http://192.168.0.1:49000/igddesc.xml
  3747. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3748.  
  3749. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3750. Trying to continue anyway
  3751. Local LAN ip address : 192.168.0.5
  3752. ExternalIPAddress =
  3753. AddPortMapping(443, 443, 192.168.0.5) failed with code 403 (UnknownError)
  3754. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3755.  
  3756. Could not forward ports automatically.
  3757. Do it manually, or activate UPnP in your router and try again
  3758.  
  3759. [ nc-forward-ports ]
  3760. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3761. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3762. for more information.
  3763. List of UPNP devices found on the network :
  3764. desc: http://192.168.0.1:49000/igddesc.xml
  3765. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3766.  
  3767. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3768. Trying to continue anyway
  3769. Local LAN ip address : 192.168.0.5
  3770. UPNP_DeletePortMapping() returned : 403
  3771. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3772. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3773. for more information.
  3774. List of UPNP devices found on the network :
  3775. desc: http://192.168.0.1:49000/igddesc.xml
  3776. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3777.  
  3778. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3779. Trying to continue anyway
  3780. Local LAN ip address : 192.168.0.5
  3781. UPNP_DeletePortMapping() returned : 403
  3782. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3783. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3784. for more information.
  3785. List of UPNP devices found on the network :
  3786. desc: http://192.168.0.1:49000/igddesc.xml
  3787. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3788.  
  3789. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3790. Trying to continue anyway
  3791. Local LAN ip address : 192.168.0.5
  3792. ExternalIPAddress =
  3793. AddPortMapping(443, 443, 192.168.0.5) failed with code 403 (UnknownError)
  3794. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3795.  
  3796. Could not forward ports automatically.
  3797. Do it manually, or activate UPnP in your router and try again
  3798.  
  3799. [ nc-limits ]
  3800. Using 729179136B for PHP
  3801. Using 4 PHP threads
  3802. Using 729179136B for Redis
  3803.  
  3804. [ no-ip ]
  3805.  
  3806. [ fail2ban ]
  3807. System config value loglevel set to string 2
  3808. System config value log_type set to string file
  3809. fail2ban enabled
  3810.  
  3811. [ fail2ban ]
  3812. fail2ban disabled
  3813.  
  3814. [ UFW ]
  3815. Backing up 'after6.rules' to '/etc/ufw/after6.rules.20180901_114833'
  3816. Backing up 'after.rules' to '/etc/ufw/after.rules.20180901_114833'
  3817. Backing up 'user.rules' to '/etc/ufw/user.rules.20180901_114833'
  3818. Backing up 'user6.rules' to '/etc/ufw/user6.rules.20180901_114833'
  3819. Backing up 'before.rules' to '/etc/ufw/before.rules.20180901_114833'
  3820. Backing up 'before6.rules' to '/etc/ufw/before6.rules.20180901_114833'
  3821.  
  3822. Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
  3823. Executing: /lib/systemd/systemd-sysv-install disable ufw
  3824. UFW disabled
  3825.  
  3826. [ fail2ban ]
  3827. System config value loglevel set to string 2
  3828. System config value log_type set to string file
  3829. fail2ban enabled
  3830.  
  3831. [ no-ip ]
  3832.  
  3833. Auto configuration for Linux client of no-ip.com.
  3834.  
  3835. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  3836. It will be used.
  3837.  
  3838. New configuration file '/usr/local/etc/no-ip2.conf' created.
  3839.  
  3840. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  3841. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  3842. noip DDNS enabled
  3843.  
  3844. [ nc-forward-ports ]
  3845. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3846. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3847. for more information.
  3848. List of UPNP devices found on the network :
  3849. desc: http://192.168.0.1:49000/l2tpv3.xml
  3850. st: upnp:rootdevice
  3851.  
  3852. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3853. Trying to continue anyway
  3854. Local LAN ip address : 192.168.0.5
  3855. UPNP_DeletePortMapping() returned : 401
  3856. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3857. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3858. for more information.
  3859. List of UPNP devices found on the network :
  3860. desc: http://192.168.0.1:49000/l2tpv3.xml
  3861. st: upnp:rootdevice
  3862.  
  3863. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3864. Trying to continue anyway
  3865. Local LAN ip address : 192.168.0.5
  3866. UPNP_DeletePortMapping() returned : 401
  3867. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3868. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3869. for more information.
  3870. List of UPNP devices found on the network :
  3871. desc: http://192.168.0.1:49000/l2tpv3.xml
  3872. st: upnp:rootdevice
  3873.  
  3874. UPnP device found. Is it an IGD ? : http://192.168.0.1:49000/
  3875. Trying to continue anyway
  3876. Local LAN ip address : 192.168.0.5
  3877. GetExternalIPAddress failed.
  3878. AddPortMapping(443, 443, 192.168.0.5) failed with code 401 (Invalid Action)
  3879. GetSpecificPortMappingEntry() failed with code 401 (Invalid Action)
  3880.  
  3881. Could not forward ports automatically.
  3882. Do it manually, or activate UPnP in your router and try again
  3883.  
  3884. [ nc-forward-ports ]
  3885. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3886. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3887. for more information.
  3888. List of UPNP devices found on the network :
  3889. desc: http://192.168.0.1:49000/igddesc.xml
  3890. st: urn:schemas-upnp-org:service:WANIPConnection:1
  3891.  
  3892. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3893. Trying to continue anyway
  3894. Local LAN ip address : 192.168.0.5
  3895. UPNP_DeletePortMapping() returned : 714
  3896. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3897. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3898. for more information.
  3899. List of UPNP devices found on the network :
  3900. desc: http://192.168.0.1:49000/igddesc.xml
  3901. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3902.  
  3903. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3904. Trying to continue anyway
  3905. Local LAN ip address : 192.168.0.5
  3906. UPNP_DeletePortMapping() returned : 714
  3907. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3908. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3909. for more information.
  3910. List of UPNP devices found on the network :
  3911. desc: http://192.168.0.1:49000/igddesc.xml
  3912. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3913.  
  3914. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3915. Trying to continue anyway
  3916. Local LAN ip address : 192.168.0.5
  3917. ExternalIPAddress =
  3918. AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3919. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3920.  
  3921. Could not forward ports automatically.
  3922. Do it manually, or activate UPnP in your router and try again
  3923.  
  3924. [ nc-forward-ports ]
  3925. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3926. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3927. for more information.
  3928. List of UPNP devices found on the network :
  3929. desc: http://192.168.0.1:49000/igddesc.xml
  3930. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3931.  
  3932. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3933. Trying to continue anyway
  3934. Local LAN ip address : 192.168.0.5
  3935. UPNP_DeletePortMapping() returned : 714
  3936. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3937. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3938. for more information.
  3939. List of UPNP devices found on the network :
  3940. desc: http://192.168.0.1:49000/igddesc.xml
  3941. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3942.  
  3943. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3944. Trying to continue anyway
  3945. Local LAN ip address : 192.168.0.5
  3946. UPNP_DeletePortMapping() returned : 714
  3947. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3948. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3949. for more information.
  3950. List of UPNP devices found on the network :
  3951. desc: http://192.168.0.1:49000/igddesc.xml
  3952. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3953.  
  3954. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3955. Trying to continue anyway
  3956. Local LAN ip address : 192.168.0.5
  3957. ExternalIPAddress =
  3958. AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3959. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  3960.  
  3961. Could not forward ports automatically.
  3962. Do it manually, or activate UPnP in your router and try again
  3963.  
  3964. [ nc-forward-ports ]
  3965. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3966. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3967. for more information.
  3968. List of UPNP devices found on the network :
  3969. desc: http://192.168.0.1:49000/igddesc.xml
  3970. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3971.  
  3972. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3973. Trying to continue anyway
  3974. Local LAN ip address : 192.168.0.5
  3975. UPNP_DeletePortMapping() returned : 714
  3976. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3977. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3978. for more information.
  3979. List of UPNP devices found on the network :
  3980. desc: http://192.168.0.1:49000/igddesc.xml
  3981. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3982.  
  3983. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3984. Trying to continue anyway
  3985. Local LAN ip address : 192.168.0.5
  3986. UPNP_DeletePortMapping() returned : 714
  3987. upnpc : miniupnpc library test client. (c) 2005-2014 Thomas Bernard
  3988. Go to http://miniupnp.free.fr/ or http://miniupnp.tuxfamily.org/
  3989. for more information.
  3990. List of UPNP devices found on the network :
  3991. desc: http://192.168.0.1:49000/igddesc.xml
  3992. st: urn:schemas-upnp-org:device:InternetGatewayDevice:1
  3993.  
  3994. Found a (not connected?) IGD : http://192.168.0.1:49000/igdupnp/control/WANIPConn1
  3995. Trying to continue anyway
  3996. Local LAN ip address : 192.168.0.5
  3997. ExternalIPAddress =
  3998. AddPortMapping(443, 443, 192.168.0.5) failed with code 718 (ConflictInMappingEntry)
  3999. GetSpecificPortMappingEntry() failed with code 714 (NoSuchEntryInArray)
  4000.  
  4001. Could not forward ports automatically.
  4002. Do it manually, or activate UPnP in your router and try again
  4003.  
  4004. [ no-ip ]
  4005.  
  4006. [ spDYN ]
  4007. [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
  4008.  
  4009. [ spDYN ]
  4010. [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
  4011.  
  4012. [ spDYN ]
  4013. [nohost] Der angegebene Host existiert nicht oder wurde gelöscht.
  4014.  
  4015. [ spDYN ]
  4016. ... removing cronfile: /etc/cron.d/spdnsupdater
  4017. spdnsUpdater is now disabled
  4018.  
  4019. [ no-ip ]
  4020.  
  4021. Auto configuration for Linux client of no-ip.com.
  4022.  
  4023. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  4024. It will be used.
  4025.  
  4026. New configuration file '/usr/local/etc/no-ip2.conf' created.
  4027.  
  4028. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  4029. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  4030. noip DDNS enabled
  4031.  
  4032. [ nc-limits ]
  4033. Using 729179136B for PHP
  4034. Using 4 PHP threads
  4035. Using 729179136B for Redis
  4036.  
  4037. [ no-ip ]
  4038.  
  4039. Auto configuration for Linux client of no-ip.com.
  4040.  
  4041. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  4042. It will be used.
  4043.  
  4044. New configuration file '/usr/local/etc/no-ip2.conf' created.
  4045.  
  4046. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  4047. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  4048. noip DDNS enabled
  4049.  
  4050. [ nc-limits ]
  4051. Using 729179136B for PHP
  4052. Using 4 PHP threads
  4053. Using 729179136B for Redis
  4054.  
  4055. [ no-ip ]
  4056.  
  4057. Auto configuration for Linux client of no-ip.com.
  4058.  
  4059. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  4060. It will be used.
  4061.  
  4062. New configuration file '/usr/local/etc/no-ip2.conf' created.
  4063.  
  4064. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  4065. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  4066. noip DDNS enabled
  4067.  
  4068. [ nc-limits ]
  4069. Using 729179136B for PHP
  4070. Using 4 PHP threads
  4071. Using 729179136B for Redis
  4072.  
  4073. [ nc-autoupdate-nc ]
  4074. automatic Nextcloud updates enabled
  4075.  
  4076. [ nc-limits ]
  4077. Using 729179136B for PHP
  4078. Using 4 PHP threads
  4079. Using 729179136B for Redis
  4080.  
  4081. [ nc-limits ]
  4082. Using 729179136B for PHP
  4083. Using 4 PHP threads
  4084. Using 729179136B for Redis
  4085.  
  4086. [ nc-limits ]
  4087. Using 729179136B for PHP
  4088. Using 4 PHP threads
  4089. Using 729179136B for Redis
  4090.  
  4091. [ nc-limits ]
  4092. Using 729179136B for PHP
  4093. Using 4 PHP threads
  4094. Using 729179136B for Redis
  4095.  
  4096. [ nc-limits ]
  4097. Using 729179136B for PHP
  4098. Using 4 PHP threads
  4099. Using 729179136B for Redis
  4100.  
  4101. [ UFW ]
  4102. Firewall is active and enabled on system startup
  4103. Synchronizing state of ufw.service with SysV service script with /lib/systemd/systemd-sysv-install.
  4104. Executing: /lib/systemd/systemd-sysv-install enable ufw
  4105.  
  4106. # web server rules
  4107. Rule added
  4108. Rule added (v6)
  4109. Rule added
  4110. Rule added (v6)
  4111. Rule added
  4112. Rule added (v6)
  4113.  
  4114. # SSH rules
  4115. Rule added
  4116. Rule added (v6)
  4117.  
  4118. # DNS rules
  4119. Rule added
  4120. Rule added (v6)
  4121.  
  4122. # SAMBA rules
  4123. Rule added
  4124. Rule added (v6)
  4125.  
  4126. # NFS rules
  4127. Rule added
  4128. Rule added (v6)
  4129.  
  4130. # UPnP rules
  4131. Rule added
  4132. UFW enabled
  4133.  
  4134. [ letsencrypt ]
  4135. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  4136. Cert not yet due for renewal
  4137. Keeping the existing certificate
  4138.  
  4139. -------------------------------------------------------------------------------
  4140. Certificate not yet due for renewal; no action taken.
  4141. -------------------------------------------------------------------------------
  4142. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  4143. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net
  4144.  
  4145. [ nc-autoupdate-nc ]
  4146. automatic Nextcloud updates enabled
  4147.  
  4148. [ nc-autoupdate-ncp ]
  4149. automatic NextCloudPi updates enabled
  4150.  
  4151. [ nc-backup-auto ]
  4152. automatic backups enabled
  4153.  
  4154. [ nc-notify-updates ]
  4155. update web notifications enabled
  4156.  
  4157. [ nc-limits ]
  4158. Using 729179136B for PHP
  4159. Using 4 PHP threads
  4160. Using 729179136B for Redis
  4161.  
  4162. [ nc-autoupdate-nc ]
  4163. automatic Nextcloud updates enabled
  4164.  
  4165. [ncp-update-nc]
  4166. Malformed version
  4167. [ncp-update-nc]
  4168. Current Nextcloud version 13.0.6.1
  4169. Available Nextcloud version 14.0.1
  4170. Download Nextcloud 14.0.1...
  4171. Back up current instance...
  4172. check free space...
  4173. Maintenance mode enabled
  4174. backup database...
  4175. backup base files...
  4176. compressing backup file...
  4177. backup /var/www//nextcloud-bkp_20181004_1538627157.tar.gz generated
  4178. Nextcloud is in maintenance mode - no apps have been loaded
  4179.  
  4180. Maintenance mode disabled
  4181. Install Nextcloud 14.0.1...
  4182. Restore apps...
  4183. * admin_notifications
  4184. * bookmarks
  4185. * bruteforcesettings
  4186. * calendar
  4187. * contacts
  4188. * end_to_end_encryption
  4189. * gpxpod
  4190. * news
  4191. * notes
  4192. * previewgenerator
  4193. * ransomware_protection
  4194. * tasks
  4195. * twofactor_totp
  4196. Fix permissions...
  4197. Upgrade...
  4198. Nextcloud or one of the apps require upgrade - only a limited number of commands are available
  4199. You may use your browser or the occ upgrade command to do the upgrade
  4200. Set log level to debug
  4201. Turned on maintenance mode
  4202. Updating database schema
  4203. Updated database
  4204. Disabled incompatible app: admin_notifications
  4205. Disabled incompatible app: bookmarks
  4206. Disabled incompatible app: gpxpod
  4207. Disabled incompatible app: ransomware_protection
  4208. Disabled incompatible app: twofactor_totp
  4209. Updating <federatedfilesharing> ...
  4210. Updated <federatedfilesharing> to 1.4.0
  4211. Updating <files_texteditor> ...
  4212. Updated <files_texteditor> to 2.6.0
  4213. Updating <files_videoplayer> ...
  4214. Updated <files_videoplayer> to 1.3.0
  4215. Updating <gallery> ...
  4216. Updated <gallery> to 18.1.0
  4217. Updating <password_policy> ...
  4218. Updated <password_policy> to 1.4.0
  4219. Updating <provisioning_api> ...
  4220. Updated <provisioning_api> to 1.4.0
  4221. Updating <serverinfo> ...
  4222. Updated <serverinfo> to 1.4.0
  4223. Updating <twofactor_backupcodes> ...
  4224. Updated <twofactor_backupcodes> to 1.3.1
  4225. Updating <updatenotification> ...
  4226. Updated <updatenotification> to 1.4.1
  4227. Updating <lookup_server_connector> ...
  4228. Updated <lookup_server_connector> to 1.2.0
  4229. Updating <oauth2> ...
  4230. Updated <oauth2> to 1.2.1
  4231. Updating <files> ...
  4232. Updated <files> to 1.9.0
  4233. Updating <activity> ...
  4234. Updated <activity> to 2.7.0
  4235. Updating <dav> ...
  4236. Fix broken values of calendar objects
  4237.  
  4238. Starting ...
  4239. 0/0 [>---------------------------] 0%
  4240. Updated <dav> to 1.6.0
  4241. Updating <files_sharing> ...
  4242. Updated <files_sharing> to 1.6.2
  4243. Updating <files_trashbin> ...
  4244. Updated <files_trashbin> to 1.4.1
  4245. Updating <files_versions> ...
  4246. Updated <files_versions> to 1.7.1
  4247. Updating <sharebymail> ...
  4248. Updated <sharebymail> to 1.4.0
  4249. Updating <workflowengine> ...
  4250. Updated <workflowengine> to 1.4.0
  4251. Updating <firstrunwizard> ...
  4252. Updated <firstrunwizard> to 2.3.0
  4253. Updating <nextcloud_announcements> ...
  4254. Updated <nextcloud_announcements> to 1.3.0
  4255. Updating <notifications> ...
  4256. Updated <notifications> to 2.2.1
  4257. Updating <theming> ...
  4258. Updated <theming> to 1.5.0
  4259. Checking for update of app activity in appstore
  4260. Checked for update of app "activity" in appstore
  4261. Checking for update of app bruteforcesettings in appstore
  4262. Checked for update of app "bruteforcesettings" in appstore
  4263. Checking for update of app calendar in appstore
  4264. Update app calendar from appstore
  4265. Checked for update of app "calendar" in appstore
  4266. Checking for update of app cloud_federation_api in appstore
  4267. Checked for update of app "cloud_federation_api" in appstore
  4268. Checking for update of app contacts in appstore
  4269. Update app contacts from appstore
  4270. Checked for update of app "contacts" in appstore
  4271. Checking for update of app dav in appstore
  4272. Checked for update of app "dav" in appstore
  4273. Checking for update of app federatedfilesharing in appstore
  4274. Checked for update of app "federatedfilesharing" in appstore
  4275. Checking for update of app files in appstore
  4276. Checked for update of app "files" in appstore
  4277. Checking for update of app files_sharing in appstore
  4278. Checked for update of app "files_sharing" in appstore
  4279. Checking for update of app files_texteditor in appstore
  4280. Checked for update of app "files_texteditor" in appstore
  4281. Checking for update of app files_trashbin in appstore
  4282. Checked for update of app "files_trashbin" in appstore
  4283. Checking for update of app files_versions in appstore
  4284. Checked for update of app "files_versions" in appstore
  4285. Checking for update of app files_videoplayer in appstore
  4286. Checked for update of app "files_videoplayer" in appstore
  4287. Checking for update of app firstrunwizard in appstore
  4288. Checked for update of app "firstrunwizard" in appstore
  4289. Checking for update of app gallery in appstore
  4290. Checked for update of app "gallery" in appstore
  4291. Checking for update of app logreader in appstore
  4292. Checked for update of app "logreader" in appstore
  4293. Checking for update of app lookup_server_connector in appstore
  4294. Checked for update of app "lookup_server_connector" in appstore
  4295. Checking for update of app nextcloud_announcements in appstore
  4296. Checked for update of app "nextcloud_announcements" in appstore
  4297. Checking for update of app notes in appstore
  4298. Checked for update of app "notes" in appstore
  4299. Checking for update of app notifications in appstore
  4300. Checked for update of app "notifications" in appstore
  4301. Checking for update of app oauth2 in appstore
  4302. Checked for update of app "oauth2" in appstore
  4303. Checking for update of app password_policy in appstore
  4304. Checked for update of app "password_policy" in appstore
  4305. Checking for update of app previewgenerator in appstore
  4306. Checked for update of app "previewgenerator" in appstore
  4307. Checking for update of app provisioning_api in appstore
  4308. Checked for update of app "provisioning_api" in appstore
  4309. Checking for update of app serverinfo in appstore
  4310. Checked for update of app "serverinfo" in appstore
  4311. Checking for update of app sharebymail in appstore
  4312. Checked for update of app "sharebymail" in appstore
  4313. Checking for update of app tasks in appstore
  4314. Checked for update of app "tasks" in appstore
  4315. Checking for update of app theming in appstore
  4316. Checked for update of app "theming" in appstore
  4317. Checking for update of app twofactor_backupcodes in appstore
  4318. Checked for update of app "twofactor_backupcodes" in appstore
  4319. Checking for update of app updatenotification in appstore
  4320. Checked for update of app "updatenotification" in appstore
  4321. Checking for update of app workflowengine in appstore
  4322. Checked for update of app "workflowengine" in appstore
  4323. Starting code integrity check...
  4324. Finished code integrity check
  4325. Update successful
  4326. Turned off maintenance mode
  4327. Reset log level
  4328. Check indices of the share table.
  4329. Adding additional mtime index to the filecache table, this can take some time...
  4330. Filecache table updated successfully.
  4331. - EXCEPTION:
  4332. - class: OC\IntegrityCheck\Exceptions\InvalidSignatureException
  4333. - message: Signature data not found.
  4334. Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181004_1538627157-13.0.6.1.tar.gz
  4335. Clean up...
  4336. [ nc-autoupdate-nc ]
  4337. automatic Nextcloud updates enabled
  4338.  
  4339. [ncp-update-nc]
  4340. Current Nextcloud version 14.0.1.1
  4341. Available Nextcloud version 14.0.1
  4342. Nothing to update
  4343.  
  4344. [ncp-update-nc]
  4345. Current Nextcloud version 14.0.1.1
  4346. Available Nextcloud version 14.0.1
  4347. Nothing to update
  4348.  
  4349. [ncp-update-nc]
  4350. Current Nextcloud version 14.0.1.1
  4351. Available Nextcloud version 14.0.1
  4352. Nothing to update
  4353.  
  4354. [ nc-limits ]
  4355. Using 729179136B for PHP
  4356. Using 4 PHP threads
  4357. Using 729179136B for Redis
  4358.  
  4359. [ncp-update-nc]
  4360. Current Nextcloud version 14.0.1.1
  4361. Available Nextcloud version 14.0.1
  4362. Nothing to update
  4363.  
  4364. [ nc-autoupdate-nc ]
  4365. automatic Nextcloud updates enabled
  4366.  
  4367. [ncp-update-nc]
  4368. Current Nextcloud version 14.0.1.1
  4369. Available Nextcloud version 14.0.1
  4370. Nothing to update
  4371.  
  4372. [ncp-update-nc]
  4373. Current Nextcloud version 14.0.1.1
  4374. Available Nextcloud version 14.0.1
  4375. Nothing to update
  4376.  
  4377. [ncp-update-nc]
  4378. Current Nextcloud version 14.0.1.1
  4379. Available Nextcloud version 14.0.1
  4380. Nothing to update
  4381.  
  4382. [ncp-update-nc]
  4383. Current Nextcloud version 14.0.1.1
  4384. Available Nextcloud version 14.0.1
  4385. Nothing to update
  4386.  
  4387. [ncp-update-nc]
  4388. Current Nextcloud version 14.0.1.1
  4389. Available Nextcloud version 14.0.1
  4390. Nothing to update
  4391.  
  4392. [ncp-update-nc]
  4393. Current Nextcloud version 14.0.1.1
  4394. Available Nextcloud version 14.0.1
  4395. Nothing to update
  4396.  
  4397. [ nc-limits ]
  4398. Using 729179136B for PHP
  4399. Using 4 PHP threads
  4400. Using 729179136B for Redis
  4401.  
  4402. [ nc-autoupdate-nc ]
  4403. automatic Nextcloud updates enabled
  4404.  
  4405. [ncp-update-nc]
  4406. Nextcloud is in maintenance mode - no apps have been loaded
  4407.  
  4408. Current Nextcloud version 14.0.1.1
  4409. Available Nextcloud version 14.0.3
  4410. Download Nextcloud 14.0.3...
  4411. Back up current instance...
  4412. Nextcloud is in maintenance mode - no apps have been loaded
  4413.  
  4414. check free space...
  4415. Maintenance mode already enabled
  4416. backup database...
  4417. backup base files...
  4418. compressing backup file...
  4419. backup /var/www//nextcloud-bkp_20181015_1539577555.tar.gz generated
  4420. Maintenance mode disabled
  4421. Install Nextcloud 14.0.3...
  4422. Restore apps...
  4423. * admin_notifications
  4424. * bookmarks
  4425. * bruteforcesettings
  4426. * calendar
  4427. * contacts
  4428. * end_to_end_encryption
  4429. * gpxpod
  4430. * news
  4431. * notes
  4432. * previewgenerator
  4433. * ransomware_protection
  4434. * tasks
  4435. * twofactor_totp
  4436. Fix permissions...
  4437. Upgrade...
  4438. Nextcloud or one of the apps require upgrade - only a limited number of commands are available
  4439. You may use your browser or the occ upgrade command to do the upgrade
  4440. Set log level to debug
  4441. Turned on maintenance mode
  4442. Updating database schema
  4443. Updated database
  4444. Checking for update of app accessibility in appstore
  4445. Checked for update of app "accessibility" in appstore
  4446. Checking for update of app activity in appstore
  4447. Checked for update of app "activity" in appstore
  4448. Checking for update of app bookmarks in appstore
  4449. Update app bookmarks from appstore
  4450. Checked for update of app "bookmarks" in appstore
  4451. Checking for update of app bruteforcesettings in appstore
  4452. Checked for update of app "bruteforcesettings" in appstore
  4453. Checking for update of app calendar in appstore
  4454. Checked for update of app "calendar" in appstore
  4455. Checking for update of app cloud_federation_api in appstore
  4456. Checked for update of app "cloud_federation_api" in appstore
  4457. Checking for update of app contacts in appstore
  4458. Checked for update of app "contacts" in appstore
  4459. Checking for update of app dav in appstore
  4460. Checked for update of app "dav" in appstore
  4461. Checking for update of app federatedfilesharing in appstore
  4462. Checked for update of app "federatedfilesharing" in appstore
  4463. Checking for update of app files in appstore
  4464. Checked for update of app "files" in appstore
  4465. Checking for update of app files_pdfviewer in appstore
  4466. Checked for update of app "files_pdfviewer" in appstore
  4467. Checking for update of app files_sharing in appstore
  4468. Checked for update of app "files_sharing" in appstore
  4469. Checking for update of app files_texteditor in appstore
  4470. Checked for update of app "files_texteditor" in appstore
  4471. Checking for update of app files_trashbin in appstore
  4472. Checked for update of app "files_trashbin" in appstore
  4473. Checking for update of app files_versions in appstore
  4474. Checked for update of app "files_versions" in appstore
  4475. Checking for update of app files_videoplayer in appstore
  4476. Checked for update of app "files_videoplayer" in appstore
  4477. Checking for update of app firstrunwizard in appstore
  4478. Checked for update of app "firstrunwizard" in appstore
  4479. Checking for update of app gallery in appstore
  4480. Checked for update of app "gallery" in appstore
  4481. Checking for update of app logreader in appstore
  4482. Checked for update of app "logreader" in appstore
  4483. Checking for update of app lookup_server_connector in appstore
  4484. Checked for update of app "lookup_server_connector" in appstore
  4485. Checking for update of app nextcloud_announcements in appstore
  4486. Checked for update of app "nextcloud_announcements" in appstore
  4487. Checking for update of app notes in appstore
  4488. Checked for update of app "notes" in appstore
  4489. Checking for update of app notifications in appstore
  4490. Checked for update of app "notifications" in appstore
  4491. Checking for update of app oauth2 in appstore
  4492. Checked for update of app "oauth2" in appstore
  4493. Checking for update of app password_policy in appstore
  4494. Checked for update of app "password_policy" in appstore
  4495. Checking for update of app previewgenerator in appstore
  4496. Checked for update of app "previewgenerator" in appstore
  4497. Checking for update of app provisioning_api in appstore
  4498. Checked for update of app "provisioning_api" in appstore
  4499. Checking for update of app serverinfo in appstore
  4500. Checked for update of app "serverinfo" in appstore
  4501. Checking for update of app sharebymail in appstore
  4502. Checked for update of app "sharebymail" in appstore
  4503. Checking for update of app support in appstore
  4504. Checked for update of app "support" in appstore
  4505. Checking for update of app tasks in appstore
  4506. Checked for update of app "tasks" in appstore
  4507. Checking for update of app theming in appstore
  4508. Checked for update of app "theming" in appstore
  4509. Checking for update of app twofactor_backupcodes in appstore
  4510. Checked for update of app "twofactor_backupcodes" in appstore
  4511. Checking for update of app updatenotification in appstore
  4512. Checked for update of app "updatenotification" in appstore
  4513. Checking for update of app workflowengine in appstore
  4514. Checked for update of app "workflowengine" in appstore
  4515. Starting code integrity check...
  4516. Finished code integrity check
  4517. Update successful
  4518. Turned off maintenance mode
  4519. Reset log level
  4520. Check indices of the share table.
  4521. Done.
  4522. Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181015_1539577555-14.0.1.1.tar.gz
  4523. Clean up...
  4524.  
  4525. [ncp-update-nc]
  4526. Current Nextcloud version 14.0.3.0
  4527. Available Nextcloud version 14.0.3
  4528. Nothing to update
  4529.  
  4530. [ncp-update-nc]
  4531. Current Nextcloud version 14.0.3.0
  4532. Available Nextcloud version 14.0.3
  4533. Nothing to update
  4534.  
  4535. [ncp-update-nc]
  4536. Current Nextcloud version 14.0.3.0
  4537. Available Nextcloud version 14.0.3
  4538. Nothing to update
  4539.  
  4540. [ letsencrypt ]
  4541. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  4542. Cert is due for renewal, auto-renewing...
  4543. Renewing an existing certificate
  4544. Performing the following challenges:
  4545. http-01 challenge for mynextcloudpi.ddns.net
  4546. Using the webroot path /var/www/nextcloud for all unmatched domains.
  4547. Waiting for verification...
  4548. Cleaning up challenges
  4549. Failed authorization procedure. mynextcloudpi.ddns.net (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://mynextcloudpi.ddns.net/.well-known/acme-challenge/82tVUwn4iTe7YFfYJJVdQ7FgSihPpngdeUBfF8VE_EY: Timeout during connect (likely firewall problem)
  4550. IMPORTANT NOTES:
  4551. - The following errors were reported by the server:
  4552.  
  4553. Domain: mynextcloudpi.ddns.net
  4554. Type: connection
  4555. Detail: Fetching
  4556. http://mynextcloudpi.ddns.net/.well-known/acme-challenge/82tVUwn4iTe7YFfYJJVdQ7FgSihPpngdeUBfF8VE_EY:
  4557. Timeout during connect (likely firewall problem)
  4558.  
  4559. To fix these errors, please make sure that your domain name was
  4560. entered correctly and the DNS A record(s) for that domain
  4561. contain(s) the right IP address. Additionally, please check that
  4562. your computer has a publicly routable IP address and that no
  4563. firewalls are preventing the server from communicating with the
  4564. client. If you're using the webroot plugin, you should also verify
  4565. that you are serving files from the webroot path you provided.
  4566.  
  4567. [ letsencrypt ]
  4568. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  4569. Cert is due for renewal, auto-renewing...
  4570. Renewing an existing certificate
  4571. Performing the following challenges:
  4572. http-01 challenge for mynextcloudpi.ddns.net
  4573. Using the webroot path /var/www/nextcloud for all unmatched domains.
  4574. Waiting for verification...
  4575. Cleaning up challenges
  4576. Generating key (2048 bits): /etc/letsencrypt/keys/0001_key-certbot.pem
  4577. Creating CSR: /etc/letsencrypt/csr/0001_csr-certbot.pem
  4578. IMPORTANT NOTES:
  4579. - Congratulations! Your certificate and chain have been saved at
  4580. /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
  4581. cert will expire on 2019-01-16. To obtain a new or tweaked version
  4582. of this certificate in the future, simply run certbot again. To
  4583. non-interactively renew *all* of your certificates, run "certbot
  4584. renew"
  4585. - If you like Certbot, please consider supporting our work by:
  4586.  
  4587. Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
  4588. Donating to EFF: https://eff.org/donate-le
  4589.  
  4590. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  4591. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  4592.  
  4593. [ nc-audit ]
  4594. General security audit
  4595.  
  4596. [ Lynis 2.4.0 ]
  4597.  
  4598. ################################################################################
  4599. Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
  4600. welcome to redistribute it under the terms of the GNU General Public License.
  4601. See the LICENSE file for details about using this software.
  4602.  
  4603. 2007-2016, CISOfy - https://cisofy.com/lynis/
  4604. Enterprise support available (compliance, plugins, interface and tools)
  4605. ################################################################################
  4606.  
  4607.  
  4608. [+] Initializing program
  4609. ------------------------------------
  4610. - Detecting OS...  [ DONE ]
  4611. - Checking profiles... [ DONE ]
  4612.  
  4613. ---------------------------------------------------
  4614. Program version: 2.4.0
  4615. Operating system: Linux
  4616. Operating system name: Debian
  4617. Operating system version: 9.4
  4618. Kernel version: 4.14.50
  4619. Hardware platform: armv7l
  4620. Hostname: nextcloudpi
  4621. ---------------------------------------------------
  4622. Profiles: /etc/lynis/default.prf /etc/lynis/ncp.prf
  4623. Log file: /var/log/lynis.log
  4624. Report file: /var/log/lynis-report.dat
  4625. Report version: 1.0
  4626. Plugin directory: /etc/lynis/plugins
  4627. ---------------------------------------------------
  4628. Auditor: [Not Specified]
  4629. Test category: all
  4630. Test group: all
  4631. ---------------------------------------------------
  4632. - Program update status...  [ WARNING ]
  4633.  
  4634. ===============================================================================
  4635. Lynis update available
  4636. ===============================================================================
  4637.  
  4638. Current version is more than 4 months old
  4639.  
  4640. Current version : 240 Latest version : 266
  4641.  
  4642. Please update to the latest version.
  4643. New releases include additional features, bug fixes, tests and baselines.
  4644.  
  4645. Download the latest version:
  4646. Packages (DEB/RPM) - https://packages.cisofy.com
  4647. Website - https://cisofy.com/downloads/
  4648. GitHub - https://github.com/CISOfy/lynis
  4649.  
  4650. ===============================================================================
  4651.  
  4652.  
  4653. [+] System Tools
  4654. ------------------------------------
  4655. - Scanning available tools...
  4656. - Checking system binaries...
  4657.  
  4658. [+] Plugins (phase 1)
  4659. ------------------------------------
  4660. Note: plugins have more extensive tests and may take several minutes to complete
  4661.  
  4662. - Plugin: debian
  4663. [
  4664. [+] Debian Tests
  4665. ------------------------------------
  4666. - Checking for system binaries that are required by Debian Tests...
  4667. - Checking /bin...  [ FOUND ]
  4668. - Checking /sbin...  [ FOUND ]
  4669. - Checking /usr/bin...  [ FOUND ]
  4670. - Checking /usr/sbin...  [ FOUND ]
  4671. - Checking /usr/local/bin...  [ FOUND ]
  4672. - Checking /usr/local/sbin...  [ FOUND ]
  4673. - Authentication:
  4674. - PAM (Pluggable Authentication Modules):
  4675. - libpam-tmpdir [ Not Installed ]
  4676. - libpam-usb [ Not Installed ]
  4677. - File System Checks:
  4678. - DM-Crypt, Cryptsetup & Cryptmount:
  4679. - Software:
  4680. - apt-listchanges [ Installed and enabled for apt ]
  4681. - checkrestart [ Installed ]
  4682. - needrestart [ Not Installed ]
  4683. - debsecan [ Installed and enabled for cron ]
  4684. - debsums [ Installed and enabled for cron ]
  4685. - fail2ban [ Installed with jail.local ]
  4686. ]
  4687.  
  4688. [+] Boot and services
  4689. ------------------------------------
  4690. - Service Manager [ systemd ]
  4691. - Checking UEFI boot [ DISABLED ]
  4692. - Boot loader [ NONE FOUND ]
  4693. - Check running services (systemctl) [ DONE ]
  4694. Result: found 30 running services
  4695. - Check enabled services at boot (systemctl) [ DONE ]
  4696. Result: found 45 enabled services
  4697. - Check startup files (permissions) [ OK ]
  4698.  
  4699. [+] Kernel
  4700. ------------------------------------
  4701. - Checking default runlevel [ runlevel 5 ]
  4702. - Checking kernel version and release [ DONE ]
  4703. - Checking kernel type [ DONE ]
  4704. - Checking loaded kernel modules [ DONE ]
  4705. Found 65 active modules
  4706. - Checking Linux kernel configuration file [ NOT FOUND ]
  4707. - Checking core dumps configuration [ DISABLED ]
  4708. - Checking setuid core dumps configuration [ DEFAULT ]
  4709. - Check if reboot is needed [ UNKNOWN ]
  4710.  
  4711. [+] Memory and Processes
  4712. ------------------------------------
  4713. - Checking /proc/meminfo [ FOUND ]
  4714. - Searching for dead/zombie processes [ OK ]
  4715. - Searching for IO waiting processes [ OK ]
  4716.  
  4717. [+] Users, Groups and Authentication
  4718. ------------------------------------
  4719. - Administrator accounts [ OK ]
  4720. - Unique UIDs [ OK ]
  4721. - Consistency of group files (grpck) [ OK ]
  4722. - Unique group IDs [ OK ]
  4723. - Unique group names [ OK ]
  4724. - Password file consistency [ OK ]
  4725. - Query system users (non daemons) [ DONE ]
  4726. - NIS+ authentication support [ NOT ENABLED ]
  4727. - NIS authentication support [ NOT ENABLED ]
  4728. - sudoers file [ FOUND ]
  4729. - Check sudoers file permissions [ OK ]
  4730. - PAM password strength tools [ SUGGESTION ]
  4731. - PAM configuration files (pam.conf) [ FOUND ]
  4732. - PAM configuration files (pam.d) [ FOUND ]
  4733. - PAM modules [ NOT FOUND ]
  4734. - LDAP module in PAM [ NOT FOUND ]
  4735. - Accounts without expire date [ OK ]
  4736. - Accounts without password [ OK ]
  4737. - Checking user password aging (minimum) [ DISABLED ]
  4738. - User password aging (maximum) [ DISABLED ]
  4739. - Checking expired passwords [ OK ]
  4740. - Checking Linux single user mode authentication [ OK ]
  4741. - Determining default umask
  4742. - umask (/etc/profile) [ NOT FOUND ]
  4743. - umask (/etc/login.defs) [ SUGGESTION ]
  4744. - LDAP authentication support [ NOT ENABLED ]
  4745. - Logging failed login attempts [ ENABLED ]
  4746.  
  4747. [+] Shells
  4748. ------------------------------------
  4749. - Checking shells from /etc/shells
  4750. Result: found 4 shells (valid shells: 4).
  4751. - Session timeout settings/tools [ NONE ]
  4752. - Checking default umask values
  4753. - Checking default umask in /etc/bash.bashrc [ NONE ]
  4754. - Checking default umask in /etc/profile [ NONE ]
  4755.  
  4756. [+] File systems
  4757. ------------------------------------
  4758. - Query swap partitions (fstab) [ NONE ]
  4759. - Testing swap partitions [ OK ]
  4760. - Testing /proc mount (hidepid) [ SUGGESTION ]
  4761. - Checking for old files in /tmp [ OK ]
  4762. - Checking /tmp sticky bit [ OK ]
  4763. - ACL support root file system [ ENABLED ]
  4764. - Mount options of / [ NON DEFAULT ]
  4765. - Mount options of /boot [ NON DEFAULT ]
  4766. - Disable kernel support of some filesystems
  4767. - Discovered kernel modules: hfs hfsplus jffs2 squashfs udf 
  4768.  
  4769. [+] Storage
  4770. ------------------------------------
  4771. - Checking USB devices authorization [ ENABLED ]
  4772.  
  4773. [+] NFS
  4774. ------------------------------------
  4775. - Query rpc registered programs [ DONE ]
  4776. - Query NFS versions [ DONE ]
  4777. - Query NFS protocols [ DONE ]
  4778. - Check running NFS daemon [ NOT FOUND ]
  4779.  
  4780. [+] Name services
  4781. ------------------------------------
  4782. - Checking /etc/hosts
  4783. - Checking /etc/hosts (duplicates) [ OK ]
  4784. - Checking /etc/hosts (hostname) [ OK ]
  4785. - Checking /etc/hosts (localhost) [ OK ]
  4786.  
  4787. [+] Ports and packages
  4788. ------------------------------------
  4789. - Searching package managers
  4790. - Searching dpkg package manager [ FOUND ]
  4791. - Querying package manager
  4792. - Query unpurged packages [ FOUND ]
  4793. - debsecan utility [ FOUND ]
  4794. - debsecan cron job [ FOUND ]
  4795. - debsums utility [ FOUND ]
  4796. - Cron job for debsums [ FOUND ]
  4797. - Checking vulnerable packages (apt-get only) [ DONE ]
  4798. - Checking package audit tool [ INSTALLED ]
  4799. Found: apt-get
  4800.  
  4801. [+] Networking
  4802. ------------------------------------
  4803. - Checking IPv6 configuration [ ENABLED ]
  4804. Configuration method [ AUTO ]
  4805. IPv6 only [ NO ]
  4806. - Checking configured nameservers
  4807. - Testing nameservers
  4808. Nameserver: 127.0.0.1 [ OK ]
  4809. - Checking default gateway [ DONE ]
  4810. - Getting listening ports (TCP/UDP) [ DONE ]
  4811. * Found 18 ports
  4812. - Checking promiscuous interfaces [ OK ]
  4813. - Checking waiting connections [ OK ]
  4814. - Checking status DHCP client [ NOT ACTIVE ]
  4815. - Checking for ARP monitoring software [ NOT FOUND ]
  4816.  
  4817. [+] Printers and Spools
  4818. ------------------------------------
  4819. - Checking cups daemon [ NOT FOUND ]
  4820. - Checking lp daemon [ NOT RUNNING ]
  4821.  
  4822. [+] Software: e-mail and messaging
  4823. ------------------------------------
  4824. - Checking Exim status [ NOT FOUND ]
  4825. - Checking Postfix status [ RUNNING ]
  4826. - Checking Postfix configuration [ FOUND ]
  4827. - Postfix banner [ WARNING ]
  4828. - Checking Dovecot status [ NOT FOUND ]
  4829. - Checking Qmail status [ NOT FOUND ]
  4830. - Checking Sendmail status [ NOT FOUND ]
  4831.  
  4832. [+] Software: firewalls
  4833. ------------------------------------
  4834. - Checking iptables kernel module [ FOUND ]
  4835. - Checking iptables policies of chains [ FOUND ]
  4836. - Checking for empty ruleset [ OK ]
  4837. - Checking host based firewall [ ACTIVE ]
  4838.  
  4839. [+] Software: webserver
  4840. ------------------------------------
  4841. - Checking Apache (binary /usr/sbin/apache2) [ FOUND ]
  4842. Info: Found 3 virtual hosts
  4843. * Loadable modules [ FOUND ]
  4844. - Found 116 loadable modules
  4845. ModSecurity: web application firewall [ FOUND ]
  4846. - Checking nginx [ NOT FOUND ]
  4847.  
  4848. [+] SSH Support
  4849. ------------------------------------
  4850. - Checking running SSH daemon [ FOUND ]
  4851. - Searching SSH configuration [ FOUND ]
  4852. - SSH option: AllowTcpForwarding [ SUGGESTION ]
  4853. - SSH option: ClientAliveCountMax [ SUGGESTION ]
  4854. - SSH option: ClientAliveInterval [ OK ]
  4855. - SSH option: Compression [ SUGGESTION ]
  4856. - SSH option: FingerprintHash [ OK ]
  4857. - SSH option: GatewayPorts [ OK ]
  4858. - SSH option: IgnoreRhosts [ OK ]
  4859. - SSH option: LoginGraceTime [ OK ]
  4860. - SSH option: LogLevel [ SUGGESTION ]
  4861. - SSH option: MaxAuthTries [ SUGGESTION ]
  4862. - SSH option: MaxSessions [ SUGGESTION ]
  4863. - SSH option: PermitRootLogin [ SUGGESTION ]
  4864. - SSH option: PermitUserEnvironment [ OK ]
  4865. - SSH option: PermitTunnel [ OK ]
  4866. - SSH option: Port [ SUGGESTION ]
  4867. - SSH option: PrintLastLog [ OK ]
  4868. - SSH option: Protocol [ NOT FOUND ]
  4869. - SSH option: StrictModes [ OK ]
  4870. - SSH option: TCPKeepAlive [ SUGGESTION ]
  4871. - SSH option: UseDNS [ OK ]
  4872. - SSH option: UsePrivilegeSeparation [ OK ]
  4873. - SSH option: VerifyReverseMapping [ NOT FOUND ]
  4874. - SSH option: X11Forwarding [ SUGGESTION ]
  4875. - SSH option: AllowAgentForwarding [ SUGGESTION ]
  4876. - SSH option: AllowUsers [ NOT FOUND ]
  4877. - SSH option: AllowGroups [ NOT FOUND ]
  4878.  
  4879. [+] SNMP Support
  4880. ------------------------------------
  4881. - Checking running SNMP daemon [ NOT FOUND ]
  4882.  
  4883. [+] Databases
  4884. ------------------------------------
  4885. - MySQL process status [ FOUND ]
  4886. - Redis (server) status [ FOUND ]
  4887. - Redis (requirepass configured) [ FOUND ]
  4888. - Redis (rename of CONFIG command) [ FOUND ]
  4889. - Redis (bind on localhost) [ FOUND ]
  4890.  
  4891. [+] LDAP Services
  4892. ------------------------------------
  4893. - Checking OpenLDAP instance [ NOT FOUND ]
  4894.  
  4895. [+] PHP
  4896. ------------------------------------
  4897. - Checking PHP [ NOT FOUND ]
  4898.  
  4899. [+] Squid Support
  4900. ------------------------------------
  4901. - Checking running Squid daemon [ NOT FOUND ]
  4902.  
  4903. [+] Logging and files
  4904. ------------------------------------
  4905. - Checking for a running log daemon [ OK ]
  4906. - Checking Syslog-NG status [ NOT FOUND ]
  4907. - Checking systemd journal status [ FOUND ]
  4908. - Checking Metalog status [ NOT FOUND ]
  4909. - Checking RSyslog status [ FOUND ]
  4910. - Checking RFC 3195 daemon status [ NOT FOUND ]
  4911. - Checking minilogd instances [ NOT FOUND ]
  4912. - Checking logrotate presence [ OK ]
  4913. - Checking log directories (static list) [ DONE ]
  4914. - Checking open log files [ DONE ]
  4915. - Checking deleted files in use [ FILES FOUND ]
  4916.  
  4917. [+] Insecure services
  4918. ------------------------------------
  4919. - Checking inetd status [ NOT ACTIVE ]
  4920.  
  4921. [+] Banners and identification
  4922. ------------------------------------
  4923. - /etc/issue [ FOUND ]
  4924. - /etc/issue contents [ WEAK ]
  4925. - /etc/issue.net [ FOUND ]
  4926. - /etc/issue.net contents [ WEAK ]
  4927.  
  4928. [+] Scheduled tasks
  4929. ------------------------------------
  4930. - Checking crontab/cronjob [ DONE ]
  4931.  
  4932. [+] Accounting
  4933. ------------------------------------
  4934. - Checking accounting information [ NOT FOUND ]
  4935. - Checking sysstat accounting data [ NOT FOUND ]
  4936.  
  4937. [+] Time and Synchronization
  4938. ------------------------------------
  4939. - NTP daemon found: systemd (timesyncd) [ FOUND ]
  4940. - Checking for a running NTP daemon or client [ OK ]
  4941.  
  4942. [+] Cryptography
  4943. ------------------------------------
  4944. - Checking for expired SSL certificates [ NONE ]
  4945.  
  4946. [+] Virtualization
  4947. ------------------------------------
  4948.  
  4949. [+] Containers
  4950. ------------------------------------
  4951.  
  4952. [+] Security frameworks
  4953. ------------------------------------
  4954. - Checking presence AppArmor [ NOT FOUND ]
  4955. - Checking presence SELinux [ NOT FOUND ]
  4956. - Checking presence grsecurity [ NOT FOUND ]
  4957. - Checking for implemented MAC framework [ NONE ]
  4958.  
  4959. [+] Software: file integrity
  4960. ------------------------------------
  4961. - Checking file integrity tools
  4962. - Checking presence integrity tool [ NOT FOUND ]
  4963.  
  4964. [+] Software: System tooling
  4965. ------------------------------------
  4966. - Checking presence of Fail2ban [ FOUND ]
  4967. WARNING 'backend' not defined in 'ssh'. Using default one: 'auto'
  4968. WARNING 'backend' not defined in 'nextcloud'. Using default one: 'auto'
  4969. - Checking Fail2ban jails [ ENABLED ]
  4970. - Checking for IDS/IPS tooling [ FOUND ]
  4971.  
  4972. [+] Software: Malware
  4973. ------------------------------------
  4974.  
  4975. [+] File Permissions
  4976. ------------------------------------
  4977. - Starting file permissions check
  4978. /etc/lilo.conf [ NOT FOUND ]
  4979. /root/.ssh [ OK ]
  4980. /etc/lilo.conf [ NOT FOUND ]
  4981. /root/.ssh [ OK ]
  4982.  
  4983. [+] Home directories
  4984. ------------------------------------
  4985. - Checking shell history files [ OK ]
  4986.  
  4987. [+] Kernel Hardening
  4988. ------------------------------------
  4989. - Comparing sysctl key pairs with scan profile
  4990. - kernel.core_uses_pid (exp: 1) [ DIFFERENT ]
  4991. - kernel.ctrl-alt-del (exp: 0) [ OK ]
  4992. - kernel.kptr_restrict (exp: 2) [ DIFFERENT ]
  4993. - kernel.randomize_va_space (exp: 2) [ OK ]
  4994. - kernel.sysrq (exp: 0) [ DIFFERENT ]
  4995. - net.ipv4.conf.all.accept_redirects (exp: 0) [ OK ]
  4996. - net.ipv4.conf.all.accept_source_route (exp: 0) [ OK ]
  4997. - net.ipv4.conf.all.bootp_relay (exp: 0) [ OK ]
  4998. - net.ipv4.conf.all.forwarding (exp: 0) [ OK ]
  4999. - net.ipv4.conf.all.log_martians (exp: 1) [ DIFFERENT ]
  5000. - net.ipv4.conf.all.mc_forwarding (exp: 0) [ OK ]
  5001. - net.ipv4.conf.all.proxy_arp (exp: 0) [ OK ]
  5002. - net.ipv4.conf.all.rp_filter (exp: 1) [ OK ]
  5003. - net.ipv4.conf.all.send_redirects (exp: 0) [ DIFFERENT ]
  5004. - net.ipv4.conf.default.accept_redirects (exp: 0) [ OK ]
  5005. - net.ipv4.conf.default.accept_source_route (exp: 0) [ OK ]
  5006. - net.ipv4.conf.default.log_martians (exp: 1) [ DIFFERENT ]
  5007. - net.ipv4.icmp_echo_ignore_broadcasts (exp: 1) [ OK ]
  5008. - net.ipv4.icmp_ignore_bogus_error_responses (exp: 1) [ OK ]
  5009. - net.ipv4.tcp_syncookies (exp: 1) [ OK ]
  5010. - net.ipv4.tcp_timestamps (exp: 0) [ DIFFERENT ]
  5011. - net.ipv6.conf.all.accept_redirects (exp: 0) [ OK ]
  5012. - net.ipv6.conf.all.accept_source_route (exp: 0) [ OK ]
  5013. - net.ipv6.conf.default.accept_redirects (exp: 0) [ OK ]
  5014. - net.ipv6.conf.default.accept_source_route (exp: 0) [ OK ]
  5015.  
  5016. [+] Hardening
  5017. ------------------------------------
  5018. - Installed compiler(s) [ FOUND ]
  5019. - Installed malware scanner [ NOT FOUND ]
  5020. - Installed malware scanner [ NOT FOUND ]
  5021.  
  5022. [+] Custom Tests
  5023. ------------------------------------
  5024. - Running custom tests...  [ NONE ]
  5025.  
  5026. [+] Plugins (phase 2)
  5027. ------------------------------------
  5028.  
  5029. ================================================================================
  5030.  
  5031. -[ Lynis 2.4.0 Results ]-
  5032.  
  5033. Warnings (2):
  5034. ----------------------------
  5035. ! Version of Lynis is very old and should be updated [LYNIS]
  5036. https://cisofy.com/controls/LYNIS/
  5037.  
  5038. ! Found mail_name in SMTP banner, and/or mail_name contains 'Postfix' [MAIL-8818]
  5039. https://cisofy.com/controls/MAIL-8818/
  5040.  
  5041. Suggestions (30):
  5042. ----------------------------
  5043. * Install libpam-tmpdir to set $TMP and $TMPDIR for PAM sessions [CUST-0280]
  5044. https://your-domain.example.org/controls/CUST-0280/
  5045.  
  5046. * Install libpam-usb to enable multi-factor authentication for PAM sessions [CUST-0285]
  5047. https://your-domain.example.org/controls/CUST-0285/
  5048.  
  5049. * Install needrestart, alternatively to debian-goodies, so that you can run needrestart after upgrades to determine which daemons are using old versions of libraries and need restarting. [CUST-0831]
  5050. https://your-domain.example.org/controls/CUST-0831/
  5051.  
  5052. * Install a PAM module for password strength testing like pam_cracklib or pam_passwdqc [AUTH-9262]
  5053. https://cisofy.com/controls/AUTH-9262/
  5054.  
  5055. * Configure minimum password age in /etc/login.defs [AUTH-9286]
  5056. https://cisofy.com/controls/AUTH-9286/
  5057.  
  5058. * Configure maximum password age in /etc/login.defs [AUTH-9286]
  5059. https://cisofy.com/controls/AUTH-9286/
  5060.  
  5061. * Default umask in /etc/login.defs could be more strict like 027 [AUTH-9328]
  5062. https://cisofy.com/controls/AUTH-9328/
  5063.  
  5064. * Purge old/removed packages (16 found) with aptitude purge or dpkg --purge command. This will cleanup old configuration files, cron jobs and startup scripts. [PKGS-7346]
  5065. https://cisofy.com/controls/PKGS-7346/
  5066.  
  5067. * Consider running ARP monitoring software (arpwatch,arpon) [NETW-3032]
  5068. https://cisofy.com/controls/NETW-3032/
  5069.  
  5070. * You are advised to hide the mail_name (option: smtpd_banner) from your postfix configuration. Use postconf -e or change your main.cf file (/etc/postfix/main.cf) [MAIL-8818]
  5071. https://cisofy.com/controls/MAIL-8818/
  5072.  
  5073. * Consider hardening SSH configuration [SSH-7408]
  5074. - Details : AllowTcpForwarding (YES --> NO)
  5075. https://cisofy.com/controls/SSH-7408/
  5076.  
  5077. * Consider hardening SSH configuration [SSH-7408]
  5078. - Details : ClientAliveCountMax (3 --> 2)
  5079. https://cisofy.com/controls/SSH-7408/
  5080.  
  5081. * Consider hardening SSH configuration [SSH-7408]
  5082. - Details : Compression (YES --> NO)
  5083. https://cisofy.com/controls/SSH-7408/
  5084.  
  5085. * Consider hardening SSH configuration [SSH-7408]
  5086. - Details : LogLevel (INFO --> VERBOSE)
  5087. https://cisofy.com/controls/SSH-7408/
  5088.  
  5089. * Consider hardening SSH configuration [SSH-7408]
  5090. - Details : MaxAuthTries (6 --> 1)
  5091. https://cisofy.com/controls/SSH-7408/
  5092.  
  5093. * Consider hardening SSH configuration [SSH-7408]
  5094. - Details : MaxSessions (10 --> 2)
  5095. https://cisofy.com/controls/SSH-7408/
  5096.  
  5097. * Consider hardening SSH configuration [SSH-7408]
  5098. - Details : PermitRootLogin (WITHOUT-PASSWORD --> NO)
  5099. https://cisofy.com/controls/SSH-7408/
  5100.  
  5101. * Consider hardening SSH configuration [SSH-7408]
  5102. - Details : Port (22 --> )
  5103. https://cisofy.com/controls/SSH-7408/
  5104.  
  5105. * Consider hardening SSH configuration [SSH-7408]
  5106. - Details : TCPKeepAlive (YES --> NO)
  5107. https://cisofy.com/controls/SSH-7408/
  5108.  
  5109. * Consider hardening SSH configuration [SSH-7408]
  5110. - Details : X11Forwarding (YES --> NO)
  5111. https://cisofy.com/controls/SSH-7408/
  5112.  
  5113. * Consider hardening SSH configuration [SSH-7408]
  5114. - Details : AllowAgentForwarding (YES --> NO)
  5115. https://cisofy.com/controls/SSH-7408/
  5116.  
  5117. * Check what deleted files are still in use and why. [LOGG-2190]
  5118. https://cisofy.com/controls/LOGG-2190/
  5119.  
  5120. * Add a legal banner to /etc/issue, to warn unauthorized users [BANN-7126]
  5121. https://cisofy.com/controls/BANN-7126/
  5122.  
  5123. * Add legal banner to /etc/issue.net, to warn unauthorized users [BANN-7130]
  5124. https://cisofy.com/controls/BANN-7130/
  5125.  
  5126. * Enable process accounting [ACCT-9622]
  5127. https://cisofy.com/controls/ACCT-9622/
  5128.  
  5129. * Enable sysstat to collect accounting (no results) [ACCT-9626]
  5130. https://cisofy.com/controls/ACCT-9626/
  5131.  
  5132. * Install a file integrity tool to monitor changes to critical and sensitive files [FINT-4350]
  5133. https://cisofy.com/controls/FINT-4350/
  5134.  
  5135. * One or more sysctl values differ from the scan profile and could be tweaked [KRNL-6000]
  5136. https://cisofy.com/controls/KRNL-6000/
  5137.  
  5138. * Harden compilers like restricting access to root user only [HRDN-7222]
  5139. https://cisofy.com/controls/HRDN-7222/
  5140.  
  5141. * Harden the system by installing at least one malware scanner, to perform periodic file system scans [HRDN-7230]
  5142. - Solution : Install a tool like rkhunter, chkrootkit, OSSEC
  5143. https://cisofy.com/controls/HRDN-7230/
  5144.  
  5145. Follow-up:
  5146. ----------------------------
  5147. - Show details of a test (lynis show details TEST-ID)
  5148. - Check the logfile for all details (less /var/log/lynis.log)
  5149. - Read security controls texts (https://cisofy.com)
  5150. - Use --upload to upload data to central system (Lynis Enterprise users)
  5151.  
  5152. ================================================================================
  5153.  
  5154. Lynis security scan details:
  5155.  
  5156. Hardening index : 65 [############# ]
  5157. Tests performed : 205
  5158. Plugins enabled : 1
  5159.  
  5160. Components:
  5161. - Firewall [V]
  5162. - Malware scanner [X]
  5163.  
  5164. Lynis Modules:
  5165. - Compliance Status [?]
  5166. - Security Audit [V]
  5167. - Vulnerability Scan [V]
  5168.  
  5169. Files:
  5170. - Test and debug information : /var/log/lynis.log
  5171. - Report data : /var/log/lynis-report.dat
  5172.  
  5173. ================================================================================
  5174. Notice: Lynis update available
  5175. Current version : 240 Latest version : 266
  5176. ================================================================================
  5177.  
  5178. Lynis 2.4.0
  5179.  
  5180. Auditing, system hardening, and compliance for UNIX-based systems
  5181. (Linux, macOS, BSD, and others)
  5182.  
  5183. 2007-2016, CISOfy - https://cisofy.com/lynis/
  5184. Enterprise support available (compliance, plugins, interface and tools)
  5185.  
  5186. ================================================================================
  5187.  
  5188. [TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)
  5189.  
  5190. Known vulnerabilities in this system
  5191. CVE-2017-14160 libvorbisfile3 (remotely exploitable, medium urgency)
  5192. CVE-2018-10392 libvorbisfile3 (remotely exploitable, medium urgency)
  5193. CVE-2018-10393 libvorbisfile3 (remotely exploitable, medium urgency)
  5194. CVE-2018-11645 libgs9-common (remotely exploitable, medium urgency)
  5195. CVE-2018-17961 libgs9-common
  5196. CVE-2018-18073 libgs9-common
  5197. CVE-2018-18284 libgs9-common
  5198. CVE-2018-5740 bind9-host
  5199. CVE-2017-17087 vim-tiny (low urgency)
  5200. CVE-2018-10754 libncurses5 (remotely exploitable, low urgency)
  5201. CVE-2016-10040 libqt5core5a (remotely exploitable, medium urgency)
  5202. CVE-2017-10268 mariadb-common (low urgency)
  5203. CVE-2017-10378 mariadb-common (remotely exploitable, medium urgency)
  5204. CVE-2017-15365 mariadb-common (remotely exploitable, medium urgency)
  5205. CVE-2017-3636 mariadb-common (medium urgency)
  5206. CVE-2017-3641 mariadb-common (remotely exploitable, medium urgency)
  5207. CVE-2017-3653 mariadb-common (remotely exploitable, low urgency)
  5208. CVE-2018-2562 mariadb-common (remotely exploitable, high urgency)
  5209. CVE-2018-2612 mariadb-common (remotely exploitable, high urgency)
  5210. CVE-2018-2622 mariadb-common (remotely exploitable, medium urgency)
  5211. CVE-2018-2640 mariadb-common (remotely exploitable, medium urgency)
  5212. CVE-2018-2665 mariadb-common (remotely exploitable, medium urgency)
  5213. CVE-2018-2668 mariadb-common (remotely exploitable, medium urgency)
  5214. CVE-2018-2755 mariadb-common (low urgency)
  5215. CVE-2018-2761 mariadb-common (remotely exploitable, medium urgency)
  5216. CVE-2018-2766 mariadb-common (remotely exploitable, medium urgency)
  5217. CVE-2018-2767 mariadb-common (remotely exploitable, low urgency)
  5218. CVE-2018-2771 mariadb-common (remotely exploitable, low urgency)
  5219. CVE-2018-2781 mariadb-common (remotely exploitable, medium urgency)
  5220. CVE-2018-2782 mariadb-common (remotely exploitable, medium urgency)
  5221. CVE-2018-2784 mariadb-common (remotely exploitable, medium urgency)
  5222. CVE-2018-2787 mariadb-common (remotely exploitable, medium urgency)
  5223. CVE-2018-2813 mariadb-common (remotely exploitable, medium urgency)
  5224. CVE-2018-2817 mariadb-common (remotely exploitable, medium urgency)
  5225. CVE-2018-2819 mariadb-common (remotely exploitable, medium urgency)
  5226. CVE-2018-3058 mariadb-common (remotely exploitable, medium urgency)
  5227. CVE-2018-3063 mariadb-common (remotely exploitable, medium urgency)
  5228. CVE-2018-3064 mariadb-common (remotely exploitable, medium urgency)
  5229. CVE-2018-3066 mariadb-common (remotely exploitable, medium urgency)
  5230. CVE-2018-3081 mariadb-common (remotely exploitable, medium urgency)
  5231. CVE-2017-12613 libapr1 (low urgency)
  5232. CVE-2017-9118 php7.2-mysql (remotely exploitable, medium urgency)
  5233. CVE-2017-9120 php7.2-mysql (remotely exploitable, high urgency)
  5234. CVE-2018-17082 php7.2-mysql
  5235. CVE-2017-1000445 imagemagick-6-common (remotely exploitable, medium urgency)
  5236. CVE-2017-1000476 imagemagick-6-common (remotely exploitable, high urgency)
  5237. CVE-2017-11531 imagemagick-6-common (remotely exploitable, medium urgency)
  5238. CVE-2017-11532 imagemagick-6-common (remotely exploitable, medium urgency)
  5239. CVE-2017-11534 imagemagick-6-common (remotely exploitable, medium urgency)
  5240. CVE-2017-11539 imagemagick-6-common (remotely exploitable, medium urgency)
  5241. CVE-2017-11644 imagemagick-6-common (remotely exploitable, medium urgency)
  5242. CVE-2017-11724 imagemagick-6-common (remotely exploitable, medium urgency)
  5243. CVE-2017-11751 imagemagick-6-common (remotely exploitable, medium urgency)
  5244. CVE-2017-11752 imagemagick-6-common (remotely exploitable, medium urgency)
  5245. CVE-2017-12140 imagemagick-6-common (remotely exploitable, high urgency)
  5246. CVE-2017-12418 imagemagick-6-common (remotely exploitable, medium urgency)
  5247. CVE-2017-12427 imagemagick-6-common (remotely exploitable, medium urgency)
  5248. CVE-2017-12429 imagemagick-6-common (remotely exploitable, high urgency)
  5249. CVE-2017-12430 imagemagick-6-common (remotely exploitable, high urgency)
  5250. CVE-2017-12433 imagemagick-6-common (remotely exploitable, medium urgency)
  5251. CVE-2017-12435 imagemagick-6-common (remotely exploitable, high urgency)
  5252. CVE-2017-12563 imagemagick-6-common (remotely exploitable, high urgency)
  5253. CVE-2017-12564 imagemagick-6-common (remotely exploitable, medium urgency)
  5254. CVE-2017-12565 imagemagick-6-common (remotely exploitable, medium urgency)
  5255. CVE-2017-12566 imagemagick-6-common (remotely exploitable, medium urgency)
  5256. CVE-2017-12641 imagemagick-6-common (remotely exploitable, medium urgency)
  5257. CVE-2017-12642 imagemagick-6-common (remotely exploitable, medium urgency)
  5258. CVE-2017-12643 imagemagick-6-common (remotely exploitable, high urgency)
  5259. CVE-2017-12654 imagemagick-6-common (remotely exploitable, medium urgency)
  5260. CVE-2017-12664 imagemagick-6-common (remotely exploitable, medium urgency)
  5261. CVE-2017-12665 imagemagick-6-common (remotely exploitable, medium urgency)
  5262. CVE-2017-12668 imagemagick-6-common (remotely exploitable, medium urgency)
  5263. CVE-2017-12670 imagemagick-6-common (remotely exploitable, medium urgency)
  5264. CVE-2017-12674 imagemagick-6-common (remotely exploitable, high urgency)
  5265. CVE-2017-12675 imagemagick-6-common (remotely exploitable, medium urgency)
  5266. CVE-2017-12676 imagemagick-6-common (remotely exploitable, medium urgency)
  5267. CVE-2017-12691 imagemagick-6-common (remotely exploitable, high urgency)
  5268. CVE-2017-12692 imagemagick-6-common (remotely exploitable, high urgency)
  5269. CVE-2017-12693 imagemagick-6-common (remotely exploitable, high urgency)
  5270. CVE-2017-12875 imagemagick-6-common (remotely exploitable, high urgency)
  5271. CVE-2017-13061 imagemagick-6-common (remotely exploitable, medium urgency)
  5272. CVE-2017-13133 imagemagick-6-common (remotely exploitable, high urgency)
  5273. CVE-2017-13146 imagemagick-6-common (remotely exploitable, medium urgency)
  5274. CVE-2017-13658 imagemagick-6-common (remotely exploitable, medium urgency)
  5275. CVE-2017-13768 imagemagick-6-common (remotely exploitable, medium urgency)
  5276. CVE-2017-14060 imagemagick-6-common (remotely exploitable, medium urgency)
  5277. CVE-2017-14172 imagemagick-6-common (remotely exploitable, high urgency)
  5278. CVE-2017-14173 imagemagick-6-common (remotely exploitable, medium urgency)
  5279. CVE-2017-14174 imagemagick-6-common (remotely exploitable, high urgency)
  5280. CVE-2017-14175 imagemagick-6-common (remotely exploitable, high urgency)
  5281. CVE-2017-14249 imagemagick-6-common (remotely exploitable, medium urgency)
  5282. CVE-2017-14341 imagemagick-6-common (remotely exploitable, high urgency)
  5283. CVE-2017-14400 imagemagick-6-common (remotely exploitable, medium urgency)
  5284. CVE-2017-14505 imagemagick-6-common (remotely exploitable, medium urgency)
  5285. CVE-2017-14528 imagemagick-6-common (remotely exploitable, medium urgency)
  5286. CVE-2017-14532 imagemagick-6-common (remotely exploitable, high urgency)
  5287. CVE-2017-14624 imagemagick-6-common (remotely exploitable, low urgency)
  5288. CVE-2017-14625 imagemagick-6-common (remotely exploitable, low urgency)
  5289. CVE-2017-14626 imagemagick-6-common (remotely exploitable, low urgency)
  5290. CVE-2017-14739 imagemagick-6-common (remotely exploitable, medium urgency)
  5291. CVE-2017-14741 imagemagick-6-common (remotely exploitable, medium urgency)
  5292. CVE-2017-15015 imagemagick-6-common (remotely exploitable, low urgency)
  5293. CVE-2017-15016 imagemagick-6-common (remotely exploitable, high urgency)
  5294. CVE-2017-15017 imagemagick-6-common (remotely exploitable, high urgency)
  5295. CVE-2017-15217 imagemagick-6-common (remotely exploitable, medium urgency)
  5296. CVE-2017-15281 imagemagick-6-common (remotely exploitable, medium urgency)
  5297. CVE-2017-17681 imagemagick-6-common (remotely exploitable, low urgency)
  5298. CVE-2017-17682 imagemagick-6-common (remotely exploitable, high urgency)
  5299. CVE-2017-17914 imagemagick-6-common (remotely exploitable, high urgency)
  5300. CVE-2017-18209 imagemagick-6-common (remotely exploitable, low urgency)
  5301. CVE-2017-18211 imagemagick-6-common (remotely exploitable, low urgency)
  5302. CVE-2017-18252 imagemagick-6-common (remotely exploitable, low urgency)
  5303. CVE-2017-18271 imagemagick-6-common (remotely exploitable, high urgency)
  5304. CVE-2017-18273 imagemagick-6-common (remotely exploitable, high urgency)
  5305. CVE-2018-10177 imagemagick-6-common (remotely exploitable, medium urgency)
  5306. CVE-2018-10804 imagemagick-6-common (remotely exploitable, medium urgency)
  5307. CVE-2018-10805 imagemagick-6-common (remotely exploitable, medium urgency)
  5308. CVE-2018-14551 imagemagick-6-common (remotely exploitable, high urgency)
  5309. CVE-2018-15607 imagemagick-6-common (low urgency)
  5310. CVE-2018-16323 imagemagick-6-common
  5311. CVE-2018-16643 imagemagick-6-common (low urgency)
  5312. CVE-2018-16749 imagemagick-6-common (low urgency)
  5313. CVE-2018-18024 imagemagick-6-common (low urgency)
  5314. CVE-2018-18025 imagemagick-6-common
  5315. CVE-2018-7443 imagemagick-6-common (remotely exploitable, medium urgency)
  5316. CVE-2018-8804 imagemagick-6-common (remotely exploitable, low urgency)
  5317. CVE-2018-8960 imagemagick-6-common (remotely exploitable, low urgency)
  5318. CVE-2018-9133 imagemagick-6-common (remotely exploitable, medium urgency)
  5319. CVE-2017-9118 php7.2-gd (remotely exploitable, medium urgency)
  5320. CVE-2017-9120 php7.2-gd (remotely exploitable, high urgency)
  5321. CVE-2018-17082 php7.2-gd
  5322. CVE-2018-10754 ncurses-term (remotely exploitable, low urgency)
  5323. CVE-2018-4117 chromium-browser (remotely exploitable, medium urgency)
  5324. CVE-2017-7475 libcairo2 (remotely exploitable, low urgency)
  5325. CVE-2017-9814 libcairo2 (remotely exploitable, low urgency)
  5326. CVE-2018-18064 libcairo2
  5327. CVE-2018-10754 libtinfo5 (remotely exploitable, low urgency)
  5328. CVE-2017-13135 libx265-95 (remotely exploitable, medium urgency)
  5329. CVE-2018-1049 libudev1 (remotely exploitable, medium urgency)
  5330. CVE-2018-6954 libudev1 (high urgency)
  5331. CVE-2017-9118 php7.2-xml (remotely exploitable, medium urgency)
  5332. CVE-2017-9120 php7.2-xml (remotely exploitable, high urgency)
  5333. CVE-2018-17082 php7.2-xml
  5334. CVE-2018-0499 libxapian30 (remotely exploitable, medium urgency)
  5335. CVE-2016-9811 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  5336. CVE-2017-5837 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  5337. CVE-2017-5844 gstreamer0.10-alsa (remotely exploitable, medium urgency)
  5338. CVE-2017-11462 libk5crypto3 (remotely exploitable, low urgency)
  5339. CVE-2018-5710 libk5crypto3 (remotely exploitable, medium urgency)
  5340. CVE-2018-5729 libk5crypto3 (remotely exploitable, medium urgency)
  5341. CVE-2018-5730 libk5crypto3 (remotely exploitable, medium urgency)
  5342. CVE-2017-9118 php7.2-fpm (remotely exploitable, medium urgency)
  5343. CVE-2017-9120 php7.2-fpm (remotely exploitable, high urgency)
  5344. CVE-2018-17082 php7.2-fpm
  5345. CVE-2018-5740 libdns162
  5346. CVE-2016-10040 libqt5dbus5 (remotely exploitable, medium urgency)
  5347. CVE-2017-10268 mariadb-client-10.1 (low urgency)
  5348. CVE-2017-10378 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5349. CVE-2017-15365 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5350. CVE-2017-3636 mariadb-client-10.1 (medium urgency)
  5351. CVE-2017-3641 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5352. CVE-2017-3653 mariadb-client-10.1 (remotely exploitable, low urgency)
  5353. CVE-2018-2562 mariadb-client-10.1 (remotely exploitable, high urgency)
  5354. CVE-2018-2612 mariadb-client-10.1 (remotely exploitable, high urgency)
  5355. CVE-2018-2622 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5356. CVE-2018-2640 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5357. CVE-2018-2665 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5358. CVE-2018-2668 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5359. CVE-2018-2755 mariadb-client-10.1 (low urgency)
  5360. CVE-2018-2761 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5361. CVE-2018-2766 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5362. CVE-2018-2767 mariadb-client-10.1 (remotely exploitable, low urgency)
  5363. CVE-2018-2771 mariadb-client-10.1 (remotely exploitable, low urgency)
  5364. CVE-2018-2781 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5365. CVE-2018-2782 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5366. CVE-2018-2784 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5367. CVE-2018-2787 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5368. CVE-2018-2813 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5369. CVE-2018-2817 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5370. CVE-2018-2819 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5371. CVE-2018-3058 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5372. CVE-2018-3063 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5373. CVE-2018-3064 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5374. CVE-2018-3066 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5375. CVE-2018-3081 mariadb-client-10.1 (remotely exploitable, medium urgency)
  5376. CVE-2017-10971 xserver-common (remotely exploitable, medium urgency)
  5377. CVE-2017-10972 xserver-common (remotely exploitable, medium urgency)
  5378. CVE-2017-12176 xserver-common (remotely exploitable, high urgency)
  5379. CVE-2017-12177 xserver-common (remotely exploitable, high urgency)
  5380. CVE-2017-12178 xserver-common (remotely exploitable, high urgency)
  5381. CVE-2017-12179 xserver-common (remotely exploitable, high urgency)
  5382. CVE-2017-12180 xserver-common (remotely exploitable, high urgency)
  5383. CVE-2017-12181 xserver-common (remotely exploitable, high urgency)
  5384. CVE-2017-12182 xserver-common (remotely exploitable, high urgency)
  5385. CVE-2017-12183 xserver-common (remotely exploitable, high urgency)
  5386. CVE-2017-12184 xserver-common (remotely exploitable, high urgency)
  5387. CVE-2017-12185 xserver-common (remotely exploitable, high urgency)
  5388. CVE-2017-12186 xserver-common (remotely exploitable, high urgency)
  5389. CVE-2017-12187 xserver-common (remotely exploitable, high urgency)
  5390. CVE-2017-13721 xserver-common (low urgency)
  5391. CVE-2017-13723 xserver-common (medium urgency)
  5392. CVE-2017-9118 php7.2-zip (remotely exploitable, medium urgency)
  5393. CVE-2017-9120 php7.2-zip (remotely exploitable, high urgency)
  5394. CVE-2018-17082 php7.2-zip
  5395. CVE-2017-11671 gcc-4.8-base (low urgency)
  5396. CVE-2018-1000656 python3-flask
  5397. CVE-2016-10517 redis-tools (remotely exploitable, medium urgency)
  5398. CVE-2018-6594 python-crypto (remotely exploitable, medium urgency)
  5399. CVE-2016-9112 libopenjp2-7 (remotely exploitable, medium urgency)
  5400. CVE-2017-17480 libopenjp2-7 (remotely exploitable, high urgency)
  5401. CVE-2018-14423 libopenjp2-7 (remotely exploitable, low urgency)
  5402. CVE-2018-18088 libopenjp2-7 (low urgency)
  5403. CVE-2018-5727 libopenjp2-7 (remotely exploitable, low urgency)
  5404. CVE-2018-5785 libopenjp2-7 (remotely exploitable, low urgency)
  5405. CVE-2018-6616 libopenjp2-7 (remotely exploitable, medium urgency)
  5406. CVE-2016-10228 libc6-dbg (remotely exploitable, medium urgency)
  5407. CVE-2017-12678 libtag1v5 (remotely exploitable, medium urgency)
  5408. CVE-2018-11439 libtag1v5 (remotely exploitable, medium urgency)
  5409. CVE-2018-1049 libpam-systemd (remotely exploitable, medium urgency)
  5410. CVE-2018-6954 libpam-systemd (high urgency)
  5411. CVE-2016-10040 libqt5widgets5 (remotely exploitable, medium urgency)
  5412. CVE-2017-18198 libcdio13 (remotely exploitable, low urgency)
  5413. CVE-2017-18199 libcdio13 (remotely exploitable, low urgency)
  5414. CVE-2018-5740 libisc160
  5415. CVE-2017-9118 php7.2-common (remotely exploitable, medium urgency)
  5416. CVE-2017-9120 php7.2-common (remotely exploitable, high urgency)
  5417. CVE-2018-17082 php7.2-common
  5418. CVE-2016-10040 libqt5network5 (remotely exploitable, medium urgency)
  5419. CVE-2017-1000445 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5420. CVE-2017-1000476 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5421. CVE-2017-11531 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5422. CVE-2017-11532 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5423. CVE-2017-11534 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5424. CVE-2017-11539 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5425. CVE-2017-11644 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5426. CVE-2017-11724 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5427. CVE-2017-11751 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5428. CVE-2017-11752 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5429. CVE-2017-12140 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5430. CVE-2017-12418 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5431. CVE-2017-12427 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5432. CVE-2017-12429 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5433. CVE-2017-12430 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5434. CVE-2017-12433 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5435. CVE-2017-12435 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5436. CVE-2017-12563 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5437. CVE-2017-12564 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5438. CVE-2017-12565 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5439. CVE-2017-12566 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5440. CVE-2017-12641 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5441. CVE-2017-12642 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5442. CVE-2017-12643 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5443. CVE-2017-12654 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5444. CVE-2017-12664 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5445. CVE-2017-12665 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5446. CVE-2017-12668 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5447. CVE-2017-12670 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5448. CVE-2017-12674 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5449. CVE-2017-12675 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5450. CVE-2017-12676 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5451. CVE-2017-12691 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5452. CVE-2017-12692 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5453. CVE-2017-12693 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5454. CVE-2017-12875 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5455. CVE-2017-13061 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5456. CVE-2017-13133 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5457. CVE-2017-13146 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5458. CVE-2017-13658 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5459. CVE-2017-13768 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5460. CVE-2017-14060 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5461. CVE-2017-14172 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5462. CVE-2017-14173 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5463. CVE-2017-14174 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5464. CVE-2017-14175 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5465. CVE-2017-14249 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5466. CVE-2017-14341 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5467. CVE-2017-14400 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5468. CVE-2017-14505 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5469. CVE-2017-14528 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5470. CVE-2017-14532 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5471. CVE-2017-14624 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5472. CVE-2017-14625 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5473. CVE-2017-14626 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5474. CVE-2017-14739 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5475. CVE-2017-14741 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5476. CVE-2017-15015 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5477. CVE-2017-15016 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5478. CVE-2017-15017 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5479. CVE-2017-15217 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5480. CVE-2017-15281 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5481. CVE-2017-17681 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5482. CVE-2017-17682 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5483. CVE-2017-17914 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5484. CVE-2017-18209 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5485. CVE-2017-18211 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5486. CVE-2017-18252 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5487. CVE-2017-18271 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5488. CVE-2017-18273 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5489. CVE-2018-10177 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5490. CVE-2018-10804 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5491. CVE-2018-10805 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5492. CVE-2018-14551 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
  5493. CVE-2018-15607 libmagickcore-6.q16-3 (low urgency)
  5494. CVE-2018-16323 libmagickcore-6.q16-3
  5495. CVE-2018-16643 libmagickcore-6.q16-3 (low urgency)
  5496. CVE-2018-16749 libmagickcore-6.q16-3 (low urgency)
  5497. CVE-2018-18024 libmagickcore-6.q16-3 (low urgency)
  5498. CVE-2018-18025 libmagickcore-6.q16-3
  5499. CVE-2018-7443 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5500. CVE-2018-8804 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5501. CVE-2018-8960 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
  5502. CVE-2018-9133 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
  5503. CVE-2017-15232 libjpeg62-turbo (remotely exploitable, low urgency)
  5504. CVE-2018-1152 libjpeg62-turbo (remotely exploitable, low urgency)
  5505. CVE-2017-10268 mariadb-server-core-10.1 (low urgency)
  5506. CVE-2017-10378 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5507. CVE-2017-15365 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5508. CVE-2017-3636 mariadb-server-core-10.1 (medium urgency)
  5509. CVE-2017-3641 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5510. CVE-2017-3653 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  5511. CVE-2018-2562 mariadb-server-core-10.1 (remotely exploitable, high urgency)
  5512. CVE-2018-2612 mariadb-server-core-10.1 (remotely exploitable, high urgency)
  5513. CVE-2018-2622 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5514. CVE-2018-2640 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5515. CVE-2018-2665 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5516. CVE-2018-2668 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5517. CVE-2018-2755 mariadb-server-core-10.1 (low urgency)
  5518. CVE-2018-2761 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5519. CVE-2018-2766 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5520. CVE-2018-2767 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  5521. CVE-2018-2771 mariadb-server-core-10.1 (remotely exploitable, low urgency)
  5522. CVE-2018-2781 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5523. CVE-2018-2782 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5524. CVE-2018-2784 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5525. CVE-2018-2787 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5526. CVE-2018-2813 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5527. CVE-2018-2817 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5528. CVE-2018-2819 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5529. CVE-2018-3058 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5530. CVE-2018-3063 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5531. CVE-2018-3064 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5532. CVE-2018-3066 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5533. CVE-2018-3081 mariadb-server-core-10.1 (remotely exploitable, medium urgency)
  5534. CVE-2018-1333 apache2 (remotely exploitable, medium urgency)
  5535. CVE-2016-1516 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5536. CVE-2016-1517 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5537. CVE-2017-1000450 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5538. CVE-2017-12597 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5539. CVE-2017-12598 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5540. CVE-2017-12599 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5541. CVE-2017-12600 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
  5542. CVE-2017-12601 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5543. CVE-2017-12602 libopencv-calib3d2.4v5 (remotely exploitable, high urgency)
  5544. CVE-2017-12603 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5545. CVE-2017-12604 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5546. CVE-2017-12605 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5547. CVE-2017-12606 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5548. CVE-2017-12862 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5549. CVE-2017-12863 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5550. CVE-2017-12864 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5551. CVE-2017-17760 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5552. CVE-2018-5268 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5553. CVE-2018-5269 libopencv-calib3d2.4v5 (remotely exploitable, medium urgency)
  5554. CVE-2018-7712 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  5555. CVE-2018-7713 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  5556. CVE-2018-7714 libopencv-calib3d2.4v5 (remotely exploitable, low urgency)
  5557. CVE-2018-5740 libisc-export160
  5558. CVE-2017-11464 librsvg2-2 (remotely exploitable, medium urgency)
  5559. CVE-2018-1000168 libnghttp2-14 (remotely exploitable, low urgency)
  5560. CVE-2017-11399 libavresample3 (remotely exploitable, medium urgency)
  5561. CVE-2017-11665 libavresample3 (remotely exploitable, medium urgency)
  5562. CVE-2017-11719 libavresample3 (remotely exploitable, medium urgency)
  5563. CVE-2017-14054 libavresample3 (remotely exploitable, high urgency)
  5564. CVE-2017-14055 libavresample3 (remotely exploitable, high urgency)
  5565. CVE-2017-14056 libavresample3 (remotely exploitable, high urgency)
  5566. CVE-2017-14057 libavresample3 (remotely exploitable, high urgency)
  5567. CVE-2017-14058 libavresample3 (remotely exploitable, medium urgency)
  5568. CVE-2017-14059 libavresample3 (remotely exploitable, high urgency)
  5569. CVE-2017-14169 libavresample3 (remotely exploitable, medium urgency)
  5570. CVE-2017-14170 libavresample3 (remotely exploitable, high urgency)
  5571. CVE-2017-14171 libavresample3 (remotely exploitable, high urgency)
  5572. CVE-2017-14222 libavresample3 (remotely exploitable, high urgency)
  5573. CVE-2017-14223 libavresample3 (remotely exploitable, high urgency)
  5574. CVE-2017-14225 libavresample3 (remotely exploitable, medium urgency)
  5575. CVE-2017-14767 libavresample3 (remotely exploitable, medium urgency)
  5576. CVE-2017-15186 libavresample3 (remotely exploitable, medium urgency)
  5577. CVE-2017-15672 libavresample3 (remotely exploitable, medium urgency)
  5578. CVE-2017-16840 libavresample3 (remotely exploitable, high urgency)
  5579. CVE-2017-17081 libavresample3 (remotely exploitable, medium urgency)
  5580. CVE-2017-9608 libavresample3 (remotely exploitable, medium urgency)
  5581. CVE-2018-10001 libavresample3 (remotely exploitable, medium urgency)
  5582. CVE-2018-12458 libavresample3 (remotely exploitable, medium urgency)
  5583. CVE-2018-12459 libavresample3 (remotely exploitable, low urgency)
  5584. CVE-2018-13300 libavresample3 (remotely exploitable, medium urgency)
  5585. CVE-2018-13301 libavresample3 (remotely exploitable, low urgency)
  5586. CVE-2018-13302 libavresample3 (remotely exploitable, medium urgency)
  5587. CVE-2018-13303 libavresample3 (remotely exploitable, medium urgency)
  5588. CVE-2018-13304 libavresample3 (remotely exploitable, medium urgency)
  5589. CVE-2018-14394 libavresample3 (remotely exploitable, medium urgency)
  5590. CVE-2018-14395 libavresample3 (remotely exploitable, medium urgency)
  5591. CVE-2018-15822 libavresample3 (low urgency)
  5592. CVE-2018-1999010 libavresample3 (remotely exploitable, high urgency)
  5593. CVE-2018-1999011 libavresample3 (remotely exploitable, medium urgency)
  5594. CVE-2018-1999012 libavresample3 (remotely exploitable, high urgency)
  5595. CVE-2018-1999013 libavresample3 (remotely exploitable, medium urgency)
  5596. CVE-2018-1999014 libavresample3 (remotely exploitable, medium urgency)
  5597. CVE-2018-1999015 libavresample3 (remotely exploitable, medium urgency)
  5598. CVE-2018-6392 libavresample3 (remotely exploitable, medium urgency)
  5599. CVE-2018-6621 libavresample3 (remotely exploitable, medium urgency)
  5600. CVE-2018-6912 libavresample3 (remotely exploitable, low urgency)
  5601. CVE-2018-7557 libavresample3 (remotely exploitable, medium urgency)
  5602. CVE-2018-7751 libavresample3 (remotely exploitable, medium urgency)
  5603. CVE-2018-9841 libavresample3 (remotely exploitable, low urgency)
  5604. CVE-2017-11399 libavutil55 (remotely exploitable, medium urgency)
  5605. CVE-2017-11665 libavutil55 (remotely exploitable, medium urgency)
  5606. CVE-2017-11719 libavutil55 (remotely exploitable, medium urgency)
  5607. CVE-2017-14054 libavutil55 (remotely exploitable, high urgency)
  5608. CVE-2017-14055 libavutil55 (remotely exploitable, high urgency)
  5609. CVE-2017-14056 libavutil55 (remotely exploitable, high urgency)
  5610. CVE-2017-14057 libavutil55 (remotely exploitable, high urgency)
  5611. CVE-2017-14058 libavutil55 (remotely exploitable, medium urgency)
  5612. CVE-2017-14059 libavutil55 (remotely exploitable, high urgency)
  5613. CVE-2017-14169 libavutil55 (remotely exploitable, medium urgency)
  5614. CVE-2017-14170 libavutil55 (remotely exploitable, high urgency)
  5615. CVE-2017-14171 libavutil55 (remotely exploitable, high urgency)
  5616. CVE-2017-14222 libavutil55 (remotely exploitable, high urgency)
  5617. CVE-2017-14223 libavutil55 (remotely exploitable, high urgency)
  5618. CVE-2017-14225 libavutil55 (remotely exploitable, medium urgency)
  5619. CVE-2017-14767 libavutil55 (remotely exploitable, medium urgency)
  5620. CVE-2017-15186 libavutil55 (remotely exploitable, medium urgency)
  5621. CVE-2017-15672 libavutil55 (remotely exploitable, medium urgency)
  5622. CVE-2017-16840 libavutil55 (remotely exploitable, high urgency)
  5623. CVE-2017-17081 libavutil55 (remotely exploitable, medium urgency)
  5624. CVE-2017-9608 libavutil55 (remotely exploitable, medium urgency)
  5625. CVE-2018-10001 libavutil55 (remotely exploitable, medium urgency)
  5626. CVE-2018-12458 libavutil55 (remotely exploitable, medium urgency)
  5627. CVE-2018-12459 libavutil55 (remotely exploitable, low urgency)
  5628. CVE-2018-13300 libavutil55 (remotely exploitable, medium urgency)
  5629. CVE-2018-13301 libavutil55 (remotely exploitable, low urgency)
  5630. CVE-2018-13302 libavutil55 (remotely exploitable, medium urgency)
  5631. CVE-2018-13303 libavutil55 (remotely exploitable, medium urgency)
  5632. CVE-2018-13304 libavutil55 (remotely exploitable, medium urgency)
  5633. CVE-2018-14394 libavutil55 (remotely exploitable, medium urgency)
  5634. CVE-2018-14395 libavutil55 (remotely exploitable, medium urgency)
  5635. CVE-2018-15822 libavutil55 (low urgency)
  5636. CVE-2018-1999010 libavutil55 (remotely exploitable, high urgency)
  5637. CVE-2018-1999011 libavutil55 (remotely exploitable, medium urgency)
  5638. CVE-2018-1999012 libavutil55 (remotely exploitable, high urgency)
  5639. CVE-2018-1999013 libavutil55 (remotely exploitable, medium urgency)
  5640. CVE-2018-1999014 libavutil55 (remotely exploitable, medium urgency)
  5641. CVE-2018-1999015 libavutil55 (remotely exploitable, medium urgency)
  5642. CVE-2018-6392 libavutil55 (remotely exploitable, medium urgency)
  5643. CVE-2018-6621 libavutil55 (remotely exploitable, medium urgency)
  5644. CVE-2018-6912 libavutil55 (remotely exploitable, low urgency)
  5645. CVE-2018-7557 libavutil55 (remotely exploitable, medium urgency)
  5646. CVE-2018-7751 libavutil55 (remotely exploitable, medium urgency)
  5647. CVE-2018-9841 libavutil55 (remotely exploitable, low urgency)
  5648. CVE-2017-9118 php7.2-ldap (remotely exploitable, medium urgency)
  5649. CVE-2017-9120 php7.2-ldap (remotely exploitable, high urgency)
  5650. CVE-2018-17082 php7.2-ldap
  5651. CVE-2018-13440 libaudiofile1 (remotely exploitable, low urgency)
  5652. CVE-2018-17095 libaudiofile1
  5653. CVE-2017-17087 xxd (low urgency)
  5654. CVE-2018-16384 modsecurity-crs (low urgency)
  5655. CVE-2018-16062 libdw1
  5656. CVE-2018-16402 libdw1 (low urgency)
  5657. CVE-2018-16403 libdw1 (low urgency)
  5658. CVE-2018-18310 libdw1
  5659. CVE-2018-14048 libpng16-16 (remotely exploitable, medium urgency)
  5660. CVE-2017-14617 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  5661. CVE-2017-14926 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  5662. CVE-2017-14928 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  5663. CVE-2017-18267 libpoppler-qt5-1 (remotely exploitable, medium urgency)
  5664. CVE-2018-13988 libpoppler-qt5-1 (remotely exploitable, low urgency)
  5665. CVE-2018-16646 libpoppler-qt5-1 (low urgency)
  5666. CVE-2018-10754 libncursesw5 (remotely exploitable, low urgency)
  5667. CVE-2018-14618 curl
  5668. CVE-2017-12618 libaprutil1-dbd-sqlite3 (low urgency)
  5669. CVE-2018-10017 libopenmpt0 (remotely exploitable, medium urgency)
  5670. CVE-2018-11710 libopenmpt0 (remotely exploitable, medium urgency)
  5671. CVE-2018-1000807 python-openssl
  5672. CVE-2018-1000808 python-openssl (low urgency)
  5673. CVE-2016-2779 libuuid1 (high urgency)
  5674. CVE-2016-10209 libarchive13 (remotely exploitable, medium urgency)
  5675. CVE-2016-10349 libarchive13 (remotely exploitable, medium urgency)
  5676. CVE-2016-10350 libarchive13 (remotely exploitable, medium urgency)
  5677. CVE-2017-14166 libarchive13 (remotely exploitable, medium urgency)
  5678. CVE-2017-14501 libarchive13 (remotely exploitable, medium urgency)
  5679. CVE-2017-14502 libarchive13 (remotely exploitable, medium urgency)
  5680. CVE-2017-14503 libarchive13 (remotely exploitable, medium urgency)
  5681. CVE-2018-6594 python3-crypto (remotely exploitable, medium urgency)
  5682. CVE-2017-9118 php7.2-curl (remotely exploitable, medium urgency)
  5683. CVE-2017-9120 php7.2-curl (remotely exploitable, high urgency)
  5684. CVE-2018-17082 php7.2-curl
  5685. CVE-2017-13884 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5686. CVE-2017-13885 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5687. CVE-2017-7153 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5688. CVE-2017-7160 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5689. CVE-2017-7161 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5690. CVE-2017-7165 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5691. CVE-2018-4088 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5692. CVE-2018-4089 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5693. CVE-2018-4096 libwebkit2gtk-4.0-37 (remotely exploitable, medium urgency)
  5694. CVE-2018-1333 apache2-utils (remotely exploitable, medium urgency)
  5695. CVE-2016-2568 libpolkit-agent-1-0 (medium urgency)
  5696. CVE-2018-1116 libpolkit-agent-1-0 (low urgency)
  5697. CVE-2018-14048 libpng-tools (remotely exploitable, medium urgency)
  5698. CVE-2017-10268 mariadb-client-core-10.1 (low urgency)
  5699. CVE-2017-10378 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5700. CVE-2017-15365 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5701. CVE-2017-3636 mariadb-client-core-10.1 (medium urgency)
  5702. CVE-2017-3641 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5703. CVE-2017-3653 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  5704. CVE-2018-2562 mariadb-client-core-10.1 (remotely exploitable, high urgency)
  5705. CVE-2018-2612 mariadb-client-core-10.1 (remotely exploitable, high urgency)
  5706. CVE-2018-2622 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5707. CVE-2018-2640 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5708. CVE-2018-2665 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5709. CVE-2018-2668 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5710. CVE-2018-2755 mariadb-client-core-10.1 (low urgency)
  5711. CVE-2018-2761 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5712. CVE-2018-2766 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5713. CVE-2018-2767 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  5714. CVE-2018-2771 mariadb-client-core-10.1 (remotely exploitable, low urgency)
  5715. CVE-2018-2781 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5716. CVE-2018-2782 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5717. CVE-2018-2784 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5718. CVE-2018-2787 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5719. CVE-2018-2813 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5720. CVE-2018-2817 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5721. CVE-2018-2819 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5722. CVE-2018-3058 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5723. CVE-2018-3063 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5724. CVE-2018-3064 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5725. CVE-2018-3066 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5726. CVE-2018-3081 mariadb-client-core-10.1 (remotely exploitable, medium urgency)
  5727. CVE-2016-2568 policykit-1 (medium urgency)
  5728. CVE-2018-1116 policykit-1 (low urgency)
  5729. CVE-2014-2886 gksu (remotely exploitable, medium urgency)
  5730. CVE-2016-10228 multiarch-support (remotely exploitable, medium urgency)
  5731. CVE-2017-1000408 multiarch-support (high urgency)
  5732. CVE-2017-1000409 multiarch-support (medium urgency)
  5733. CVE-2017-12132 multiarch-support (remotely exploitable, medium urgency)
  5734. CVE-2017-15670 multiarch-support (remotely exploitable, high urgency)
  5735. CVE-2017-15671 multiarch-support (remotely exploitable, medium urgency)
  5736. CVE-2017-15804 multiarch-support (remotely exploitable, low urgency)
  5737. CVE-2017-16997 multiarch-support (remotely exploitable, high urgency)
  5738. CVE-2017-18269 multiarch-support (remotely exploitable, high urgency)
  5739. CVE-2018-1000001 multiarch-support (high urgency)
  5740. CVE-2018-11236 multiarch-support (remotely exploitable, low urgency)
  5741. CVE-2018-11237 multiarch-support (low urgency)
  5742. CVE-2018-6485 multiarch-support (remotely exploitable, high urgency)
  5743. CVE-2018-6551 multiarch-support (remotely exploitable, high urgency)
  5744. CVE-2018-1049 systemd-sysv (remotely exploitable, medium urgency)
  5745. CVE-2018-6954 systemd-sysv (high urgency)
  5746. CVE-2018-16062 libelf1
  5747. CVE-2018-16402 libelf1 (low urgency)
  5748. CVE-2018-16403 libelf1 (low urgency)
  5749. CVE-2018-18310 libelf1
  5750. CVE-2017-18198 libcdio-cdda1 (remotely exploitable, low urgency)
  5751. CVE-2017-18199 libcdio-cdda1 (remotely exploitable, low urgency)
  5752. CVE-2017-14617 libpoppler64 (remotely exploitable, medium urgency)
  5753. CVE-2017-14926 libpoppler64 (remotely exploitable, medium urgency)
  5754. CVE-2017-14928 libpoppler64 (remotely exploitable, medium urgency)
  5755. CVE-2017-18267 libpoppler64 (remotely exploitable, medium urgency)
  5756. CVE-2018-13988 libpoppler64 (remotely exploitable, low urgency)
  5757. CVE-2018-16646 libpoppler64 (low urgency)
  5758. CVE-2018-16428 libglib2.0-0 (low urgency)
  5759. CVE-2018-16429 libglib2.0-0 (low urgency)
  5760. CVE-2018-9234 gpgv (remotely exploitable, low urgency)
  5761. CVE-2017-11399 libavfilter6 (remotely exploitable, medium urgency)
  5762. CVE-2017-11665 libavfilter6 (remotely exploitable, medium urgency)
  5763. CVE-2017-11719 libavfilter6 (remotely exploitable, medium urgency)
  5764. CVE-2017-14054 libavfilter6 (remotely exploitable, high urgency)
  5765. CVE-2017-14055 libavfilter6 (remotely exploitable, high urgency)
  5766. CVE-2017-14056 libavfilter6 (remotely exploitable, high urgency)
  5767. CVE-2017-14057 libavfilter6 (remotely exploitable, high urgency)
  5768. CVE-2017-14058 libavfilter6 (remotely exploitable, medium urgency)
  5769. CVE-2017-14059 libavfilter6 (remotely exploitable, high urgency)
  5770. CVE-2017-14169 libavfilter6 (remotely exploitable, medium urgency)
  5771. CVE-2017-14170 libavfilter6 (remotely exploitable, high urgency)
  5772. CVE-2017-14171 libavfilter6 (remotely exploitable, high urgency)
  5773. CVE-2017-14222 libavfilter6 (remotely exploitable, high urgency)
  5774. CVE-2017-14223 libavfilter6 (remotely exploitable, high urgency)
  5775. CVE-2017-14225 libavfilter6 (remotely exploitable, medium urgency)
  5776. CVE-2017-14767 libavfilter6 (remotely exploitable, medium urgency)
  5777. CVE-2017-15186 libavfilter6 (remotely exploitable, medium urgency)
  5778. CVE-2017-15672 libavfilter6 (remotely exploitable, medium urgency)
  5779. CVE-2017-16840 libavfilter6 (remotely exploitable, high urgency)
  5780. CVE-2017-17081 libavfilter6 (remotely exploitable, medium urgency)
  5781. CVE-2017-9608 libavfilter6 (remotely exploitable, medium urgency)
  5782. CVE-2018-10001 libavfilter6 (remotely exploitable, medium urgency)
  5783. CVE-2018-12458 libavfilter6 (remotely exploitable, medium urgency)
  5784. CVE-2018-12459 libavfilter6 (remotely exploitable, low urgency)
  5785. CVE-2018-13300 libavfilter6 (remotely exploitable, medium urgency)
  5786. CVE-2018-13301 libavfilter6 (remotely exploitable, low urgency)
  5787. CVE-2018-13302 libavfilter6 (remotely exploitable, medium urgency)
  5788. CVE-2018-13303 libavfilter6 (remotely exploitable, medium urgency)
  5789. CVE-2018-13304 libavfilter6 (remotely exploitable, medium urgency)
  5790. CVE-2018-14394 libavfilter6 (remotely exploitable, medium urgency)
  5791. CVE-2018-14395 libavfilter6 (remotely exploitable, medium urgency)
  5792. CVE-2018-15822 libavfilter6 (low urgency)
  5793. CVE-2018-1999010 libavfilter6 (remotely exploitable, high urgency)
  5794. CVE-2018-1999011 libavfilter6 (remotely exploitable, medium urgency)
  5795. CVE-2018-1999012 libavfilter6 (remotely exploitable, high urgency)
  5796. CVE-2018-1999013 libavfilter6 (remotely exploitable, medium urgency)
  5797. CVE-2018-1999014 libavfilter6 (remotely exploitable, medium urgency)
  5798. CVE-2018-1999015 libavfilter6 (remotely exploitable, medium urgency)
  5799. CVE-2018-6392 libavfilter6 (remotely exploitable, medium urgency)
  5800. CVE-2018-6621 libavfilter6 (remotely exploitable, medium urgency)
  5801. CVE-2018-6912 libavfilter6 (remotely exploitable, low urgency)
  5802. CVE-2018-7557 libavfilter6 (remotely exploitable, medium urgency)
  5803. CVE-2018-7751 libavfilter6 (remotely exploitable, medium urgency)
  5804. CVE-2018-9841 libavfilter6 (remotely exploitable, low urgency)
  5805. CVE-2018-5740 libisccfg140
  5806. CVE-2016-2779 bsdutils (high urgency)
  5807. CVE-2017-16612 libwayland-client0 (remotely exploitable, medium urgency)
  5808. CVE-2017-11399 libavcodec57 (remotely exploitable, medium urgency)
  5809. CVE-2017-11665 libavcodec57 (remotely exploitable, medium urgency)
  5810. CVE-2017-11719 libavcodec57 (remotely exploitable, medium urgency)
  5811. CVE-2017-14054 libavcodec57 (remotely exploitable, high urgency)
  5812. CVE-2017-14055 libavcodec57 (remotely exploitable, high urgency)
  5813. CVE-2017-14056 libavcodec57 (remotely exploitable, high urgency)
  5814. CVE-2017-14057 libavcodec57 (remotely exploitable, high urgency)
  5815. CVE-2017-14058 libavcodec57 (remotely exploitable, medium urgency)
  5816. CVE-2017-14059 libavcodec57 (remotely exploitable, high urgency)
  5817. CVE-2017-14169 libavcodec57 (remotely exploitable, medium urgency)
  5818. CVE-2017-14170 libavcodec57 (remotely exploitable, high urgency)
  5819. CVE-2017-14171 libavcodec57 (remotely exploitable, high urgency)
  5820. CVE-2017-14222 libavcodec57 (remotely exploitable, high urgency)
  5821. CVE-2017-14223 libavcodec57 (remotely exploitable, high urgency)
  5822. CVE-2017-14225 libavcodec57 (remotely exploitable, medium urgency)
  5823. CVE-2017-14767 libavcodec57 (remotely exploitable, medium urgency)
  5824. CVE-2017-15186 libavcodec57 (remotely exploitable, medium urgency)
  5825. CVE-2017-15672 libavcodec57 (remotely exploitable, medium urgency)
  5826. CVE-2017-16840 libavcodec57 (remotely exploitable, high urgency)
  5827. CVE-2017-17081 libavcodec57 (remotely exploitable, medium urgency)
  5828. CVE-2017-9608 libavcodec57 (remotely exploitable, medium urgency)
  5829. CVE-2018-10001 libavcodec57 (remotely exploitable, medium urgency)
  5830. CVE-2018-12458 libavcodec57 (remotely exploitable, medium urgency)
  5831. CVE-2018-12459 libavcodec57 (remotely exploitable, low urgency)
  5832. CVE-2018-13300 libavcodec57 (remotely exploitable, medium urgency)
  5833. CVE-2018-13301 libavcodec57 (remotely exploitable, low urgency)
  5834. CVE-2018-13302 libavcodec57 (remotely exploitable, medium urgency)
  5835. CVE-2018-13303 libavcodec57 (remotely exploitable, medium urgency)
  5836. CVE-2018-13304 libavcodec57 (remotely exploitable, medium urgency)
  5837. CVE-2018-14394 libavcodec57 (remotely exploitable, medium urgency)
  5838. CVE-2018-14395 libavcodec57 (remotely exploitable, medium urgency)
  5839. CVE-2018-15822 libavcodec57 (low urgency)
  5840. CVE-2018-1999010 libavcodec57 (remotely exploitable, high urgency)
  5841. CVE-2018-1999011 libavcodec57 (remotely exploitable, medium urgency)
  5842. CVE-2018-1999012 libavcodec57 (remotely exploitable, high urgency)
  5843. CVE-2018-1999013 libavcodec57 (remotely exploitable, medium urgency)
  5844. CVE-2018-1999014 libavcodec57 (remotely exploitable, medium urgency)
  5845. CVE-2018-1999015 libavcodec57 (remotely exploitable, medium urgency)
  5846. CVE-2018-6392 libavcodec57 (remotely exploitable, medium urgency)
  5847. CVE-2018-6621 libavcodec57 (remotely exploitable, medium urgency)
  5848. CVE-2018-6912 libavcodec57 (remotely exploitable, low urgency)
  5849. CVE-2018-7557 libavcodec57 (remotely exploitable, medium urgency)
  5850. CVE-2018-7751 libavcodec57 (remotely exploitable, medium urgency)
  5851. CVE-2018-9841 libavcodec57 (remotely exploitable, low urgency)
  5852. CVE-2017-7475 libcairo-gobject2 (remotely exploitable, low urgency)
  5853. CVE-2017-9814 libcairo-gobject2 (remotely exploitable, low urgency)
  5854. CVE-2018-18064 libcairo-gobject2
  5855. CVE-2018-14618 libcurl4
  5856. CVE-2016-9797 libbluetooth3 (remotely exploitable, medium urgency)
  5857. CVE-2016-9798 libbluetooth3 (remotely exploitable, medium urgency)
  5858. CVE-2016-9799 libbluetooth3 (remotely exploitable, medium urgency)
  5859. CVE-2016-9800 libbluetooth3 (remotely exploitable, medium urgency)
  5860. CVE-2016-9801 libbluetooth3 (remotely exploitable, medium urgency)
  5861. CVE-2016-9802 libbluetooth3 (remotely exploitable, medium urgency)
  5862. CVE-2016-9803 libbluetooth3 (remotely exploitable, medium urgency)
  5863. CVE-2016-9804 libbluetooth3 (remotely exploitable, medium urgency)
  5864. CVE-2016-9917 libbluetooth3 (remotely exploitable, medium urgency)
  5865. CVE-2016-9918 libbluetooth3 (remotely exploitable, medium urgency)
  5866. CVE-2017-1000250 libbluetooth3 (remotely exploitable, low urgency)
  5867. CVE-2018-10910 libbluetooth3
  5868. CVE-2018-9234 gnupg (remotely exploitable, low urgency)
  5869. CVE-2018-1000035 unzip (remotely exploitable, medium urgency)
  5870. CVE-2016-10723 linux-libc-dev (medium urgency)
  5871. CVE-2016-8660 linux-libc-dev (low urgency)
  5872. CVE-2017-18232 linux-libc-dev (low urgency)
  5873. CVE-2017-18249 linux-libc-dev (medium urgency)
  5874. CVE-2017-18255 linux-libc-dev (medium urgency)
  5875. CVE-2017-5753 linux-libc-dev (medium urgency)
  5876. CVE-2018-1000026 linux-libc-dev (remotely exploitable, medium urgency)
  5877. CVE-2018-1000204 linux-libc-dev (remotely exploitable, medium urgency)
  5878. CVE-2018-10021 linux-libc-dev (medium urgency)
  5879. CVE-2018-10087 linux-libc-dev (low urgency)
  5880. CVE-2018-10124 linux-libc-dev (low urgency)
  5881. CVE-2018-10322 linux-libc-dev (medium urgency)
  5882. CVE-2018-10853 linux-libc-dev
  5883. CVE-2018-10876 linux-libc-dev (medium urgency)
  5884. CVE-2018-10877 linux-libc-dev (remotely exploitable, medium urgency)
  5885. CVE-2018-10878 linux-libc-dev (medium urgency)
  5886. CVE-2018-10879 linux-libc-dev (medium urgency)
  5887. CVE-2018-10880 linux-libc-dev (remotely exploitable, high urgency)
  5888. CVE-2018-10881 linux-libc-dev (medium urgency)
  5889. CVE-2018-10882 linux-libc-dev (medium urgency)
  5890. CVE-2018-10883 linux-libc-dev (medium urgency)
  5891. CVE-2018-10902 linux-libc-dev
  5892. CVE-2018-10938 linux-libc-dev
  5893. CVE-2018-10940 linux-libc-dev (medium urgency)
  5894. CVE-2018-1108 linux-libc-dev (remotely exploitable, medium urgency)
  5895. CVE-2018-1118 linux-libc-dev (low urgency)
  5896. CVE-2018-1120 linux-libc-dev (remotely exploitable, low urgency)
  5897. CVE-2018-1130 linux-libc-dev (medium urgency)
  5898. CVE-2018-11506 linux-libc-dev (high urgency)
  5899. CVE-2018-12233 linux-libc-dev (remotely exploitable, medium urgency)
  5900. CVE-2018-12928 linux-libc-dev (medium urgency)
  5901. CVE-2018-13053 linux-libc-dev (medium urgency)
  5902. CVE-2018-13094 linux-libc-dev (remotely exploitable, medium urgency)
  5903. CVE-2018-13096 linux-libc-dev (remotely exploitable, medium urgency)
  5904. CVE-2018-13099 linux-libc-dev (remotely exploitable, medium urgency)
  5905. CVE-2018-13405 linux-libc-dev (medium urgency)
  5906. CVE-2018-14609 linux-libc-dev (remotely exploitable, high urgency)
  5907. CVE-2018-14617 linux-libc-dev (remotely exploitable, high urgency)
  5908. CVE-2018-14633 linux-libc-dev
  5909. CVE-2018-14678 linux-libc-dev (high urgency)
  5910. CVE-2018-14734 linux-libc-dev (medium urgency)
  5911. CVE-2018-15572 linux-libc-dev
  5912. CVE-2018-15594 linux-libc-dev
  5913. CVE-2018-16276 linux-libc-dev
  5914. CVE-2018-16658 linux-libc-dev
  5915. CVE-2018-17182 linux-libc-dev
  5916. CVE-2018-3620 linux-libc-dev (medium urgency)
  5917. CVE-2018-3639 linux-libc-dev (medium urgency)
  5918. CVE-2018-3646 linux-libc-dev (medium urgency)
  5919. CVE-2018-5390 linux-libc-dev (remotely exploitable, high urgency)
  5920. CVE-2018-5391 linux-libc-dev
  5921. CVE-2018-5814 linux-libc-dev (medium urgency)
  5922. CVE-2018-6412 linux-libc-dev (remotely exploitable, medium urgency)
  5923. CVE-2018-6554 linux-libc-dev
  5924. CVE-2018-6555 linux-libc-dev
  5925. CVE-2018-7273 linux-libc-dev (medium urgency)
  5926. CVE-2018-7755 linux-libc-dev (low urgency)
  5927. CVE-2018-9363 linux-libc-dev
  5928. CVE-2018-9516 linux-libc-dev
  5929. CVE-2016-2779 mount (high urgency)
  5930. CVE-2018-10844 libgnutls30
  5931. CVE-2018-10845 libgnutls30
  5932. CVE-2018-10846 libgnutls30
  5933. CVE-2018-14598 libx11-6 (low urgency)
  5934. CVE-2018-14599 libx11-6 (low urgency)
  5935. CVE-2018-14600 libx11-6 (low urgency)
  5936. CVE-2017-6888 libflac8 (remotely exploitable, low urgency)
  5937. CVE-2018-1333 apache2-bin (remotely exploitable, medium urgency)
  5938. CVE-2018-1049 libsystemd0 (remotely exploitable, medium urgency)
  5939. CVE-2018-6954 libsystemd0 (high urgency)
  5940. CVE-2018-5740 libdns-export162
  5941. CVE-2016-10228 libc6 (remotely exploitable, medium urgency)
  5942. CVE-2018-14526 wpasupplicant
  5943. CVE-2018-1000222 libgd3 (remotely exploitable, low urgency)
  5944. CVE-2018-5711 libgd3 (remotely exploitable, medium urgency)
  5945. CVE-2018-1333 apache2-data (remotely exploitable, medium urgency)
  5946. CVE-2018-12384 libnss3 (low urgency)
  5947. CVE-2017-16611 libxfont2 (low urgency)
  5948. CVE-2017-11613 libtiff5 (remotely exploitable, medium urgency)
  5949. CVE-2017-17942 libtiff5 (remotely exploitable, medium urgency)
  5950. CVE-2018-10963 libtiff5 (remotely exploitable, medium urgency)
  5951. CVE-2018-12900 libtiff5 (remotely exploitable, medium urgency)
  5952. CVE-2018-15209 libtiff5 (remotely exploitable, medium urgency)
  5953. CVE-2018-16335 libtiff5
  5954. CVE-2018-17000 libtiff5
  5955. CVE-2018-17100 libtiff5
  5956. CVE-2018-17101 libtiff5
  5957. CVE-2018-17795 libtiff5
  5958. CVE-2018-5360 libtiff5 (remotely exploitable, medium urgency)
  5959. CVE-2018-5784 libtiff5 (remotely exploitable, medium urgency)
  5960. CVE-2018-7456 libtiff5 (remotely exploitable, medium urgency)
  5961. CVE-2018-8905 libtiff5 (remotely exploitable, medium urgency)
  5962. CVE-2018-15607 imagemagick-6.q16 (low urgency)
  5963. CVE-2018-16323 imagemagick-6.q16
  5964. CVE-2018-16412 imagemagick-6.q16
  5965. CVE-2018-16413 imagemagick-6.q16
  5966. CVE-2018-16644 imagemagick-6.q16
  5967. CVE-2018-16645 imagemagick-6.q16
  5968. CVE-2018-18024 imagemagick-6.q16 (low urgency)
  5969. CVE-2018-18025 imagemagick-6.q16
  5970. CVE-2016-2779 libfdisk1 (high urgency)
  5971. CVE-2016-3977 libgif7 (remotely exploitable, medium urgency)
  5972. CVE-2018-11489 libgif7 (remotely exploitable, medium urgency)
  5973. CVE-2018-11490 libgif7 (remotely exploitable, medium urgency)
  5974. CVE-2016-1516 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5975. CVE-2016-1517 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5976. CVE-2017-1000450 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5977. CVE-2017-12597 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5978. CVE-2017-12598 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5979. CVE-2017-12599 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5980. CVE-2017-12600 libopencv-core2.4v5 (remotely exploitable, high urgency)
  5981. CVE-2017-12601 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5982. CVE-2017-12602 libopencv-core2.4v5 (remotely exploitable, high urgency)
  5983. CVE-2017-12603 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5984. CVE-2017-12604 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5985. CVE-2017-12605 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5986. CVE-2017-12606 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5987. CVE-2017-12862 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5988. CVE-2017-12863 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5989. CVE-2017-12864 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5990. CVE-2017-17760 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5991. CVE-2018-5268 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5992. CVE-2018-5269 libopencv-core2.4v5 (remotely exploitable, medium urgency)
  5993. CVE-2018-7712 libopencv-core2.4v5 (remotely exploitable, low urgency)
  5994. CVE-2018-7713 libopencv-core2.4v5 (remotely exploitable, low urgency)
  5995. CVE-2018-7714 libopencv-core2.4v5 (remotely exploitable, low urgency)
  5996. CVE-2018-5740 dnsutils
  5997. CVE-2016-1516 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  5998. CVE-2016-1517 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  5999. CVE-2017-1000450 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6000. CVE-2017-12597 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6001. CVE-2017-12598 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6002. CVE-2017-12599 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6003. CVE-2017-12600 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
  6004. CVE-2017-12601 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6005. CVE-2017-12602 libopencv-features2d2.4v5 (remotely exploitable, high urgency)
  6006. CVE-2017-12603 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6007. CVE-2017-12604 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6008. CVE-2017-12605 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6009. CVE-2017-12606 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6010. CVE-2017-12862 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6011. CVE-2017-12863 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6012. CVE-2017-12864 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6013. CVE-2017-17760 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6014. CVE-2018-5268 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6015. CVE-2018-5269 libopencv-features2d2.4v5 (remotely exploitable, medium urgency)
  6016. CVE-2018-7712 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  6017. CVE-2018-7713 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  6018. CVE-2018-7714 libopencv-features2d2.4v5 (remotely exploitable, low urgency)
  6019. CVE-2017-1000418 libwildmidi2 (remotely exploitable, medium urgency)
  6020. CVE-2017-11661 libwildmidi2 (remotely exploitable, low urgency)
  6021. CVE-2017-11662 libwildmidi2 (remotely exploitable, low urgency)
  6022. CVE-2017-11663 libwildmidi2 (remotely exploitable, low urgency)
  6023. CVE-2017-11664 libwildmidi2 (remotely exploitable, low urgency)
  6024. CVE-2018-4117 chromium-browser-l10n (remotely exploitable, medium urgency)
  6025. CVE-2016-2781 coreutils (low urgency)
  6026. CVE-2017-12596 libopenexr22 (remotely exploitable, medium urgency)
  6027. CVE-2017-14988 libopenexr22 (remotely exploitable, medium urgency)
  6028. CVE-2017-9110 libopenexr22 (remotely exploitable, medium urgency)
  6029. CVE-2017-9111 libopenexr22 (remotely exploitable, medium urgency)
  6030. CVE-2017-9112 libopenexr22 (remotely exploitable, medium urgency)
  6031. CVE-2017-9113 libopenexr22 (remotely exploitable, medium urgency)
  6032. CVE-2017-9114 libopenexr22 (remotely exploitable, medium urgency)
  6033. CVE-2017-9115 libopenexr22 (remotely exploitable, medium urgency)
  6034. CVE-2017-9116 libopenexr22 (remotely exploitable, medium urgency)
  6035. CVE-2017-11399 libswresample2 (remotely exploitable, medium urgency)
  6036. CVE-2017-11665 libswresample2 (remotely exploitable, medium urgency)
  6037. CVE-2017-11719 libswresample2 (remotely exploitable, medium urgency)
  6038. CVE-2017-14054 libswresample2 (remotely exploitable, high urgency)
  6039. CVE-2017-14055 libswresample2 (remotely exploitable, high urgency)
  6040. CVE-2017-14056 libswresample2 (remotely exploitable, high urgency)
  6041. CVE-2017-14057 libswresample2 (remotely exploitable, high urgency)
  6042. CVE-2017-14058 libswresample2 (remotely exploitable, medium urgency)
  6043. CVE-2017-14059 libswresample2 (remotely exploitable, high urgency)
  6044. CVE-2017-14169 libswresample2 (remotely exploitable, medium urgency)
  6045. CVE-2017-14170 libswresample2 (remotely exploitable, high urgency)
  6046. CVE-2017-14171 libswresample2 (remotely exploitable, high urgency)
  6047. CVE-2017-14222 libswresample2 (remotely exploitable, high urgency)
  6048. CVE-2017-14223 libswresample2 (remotely exploitable, high urgency)
  6049. CVE-2017-14225 libswresample2 (remotely exploitable, medium urgency)
  6050. CVE-2017-14767 libswresample2 (remotely exploitable, medium urgency)
  6051. CVE-2017-15186 libswresample2 (remotely exploitable, medium urgency)
  6052. CVE-2017-15672 libswresample2 (remotely exploitable, medium urgency)
  6053. CVE-2017-16840 libswresample2 (remotely exploitable, high urgency)
  6054. CVE-2017-17081 libswresample2 (remotely exploitable, medium urgency)
  6055. CVE-2017-9608 libswresample2 (remotely exploitable, medium urgency)
  6056. CVE-2018-10001 libswresample2 (remotely exploitable, medium urgency)
  6057. CVE-2018-12458 libswresample2 (remotely exploitable, medium urgency)
  6058. CVE-2018-12459 libswresample2 (remotely exploitable, low urgency)
  6059. CVE-2018-13300 libswresample2 (remotely exploitable, medium urgency)
  6060. CVE-2018-13301 libswresample2 (remotely exploitable, low urgency)
  6061. CVE-2018-13302 libswresample2 (remotely exploitable, medium urgency)
  6062. CVE-2018-13303 libswresample2 (remotely exploitable, medium urgency)
  6063. CVE-2018-13304 libswresample2 (remotely exploitable, medium urgency)
  6064. CVE-2018-14394 libswresample2 (remotely exploitable, medium urgency)
  6065. CVE-2018-14395 libswresample2 (remotely exploitable, medium urgency)
  6066. CVE-2018-15822 libswresample2 (low urgency)
  6067. CVE-2018-1999010 libswresample2 (remotely exploitable, high urgency)
  6068. CVE-2018-1999011 libswresample2 (remotely exploitable, medium urgency)
  6069. CVE-2018-1999012 libswresample2 (remotely exploitable, high urgency)
  6070. CVE-2018-1999013 libswresample2 (remotely exploitable, medium urgency)
  6071. CVE-2018-1999014 libswresample2 (remotely exploitable, medium urgency)
  6072. CVE-2018-1999015 libswresample2 (remotely exploitable, medium urgency)
  6073. CVE-2018-6392 libswresample2 (remotely exploitable, medium urgency)
  6074. CVE-2018-6621 libswresample2 (remotely exploitable, medium urgency)
  6075. CVE-2018-6912 libswresample2 (remotely exploitable, low urgency)
  6076. CVE-2018-7557 libswresample2 (remotely exploitable, medium urgency)
  6077. CVE-2018-7751 libswresample2 (remotely exploitable, medium urgency)
  6078. CVE-2018-9841 libswresample2 (remotely exploitable, low urgency)
  6079. CVE-2016-10040 libqt5printsupport5 (remotely exploitable, medium urgency)
  6080. CVE-2017-11462 libkrb5support0 (remotely exploitable, low urgency)
  6081. CVE-2018-5710 libkrb5support0 (remotely exploitable, medium urgency)
  6082. CVE-2018-5729 libkrb5support0 (remotely exploitable, medium urgency)
  6083. CVE-2018-5730 libkrb5support0 (remotely exploitable, medium urgency)
  6084. CVE-2017-10971 xserver-xorg-core (remotely exploitable, medium urgency)
  6085. CVE-2017-10972 xserver-xorg-core (remotely exploitable, medium urgency)
  6086. CVE-2017-12176 xserver-xorg-core (remotely exploitable, high urgency)
  6087. CVE-2017-12177 xserver-xorg-core (remotely exploitable, high urgency)
  6088. CVE-2017-12178 xserver-xorg-core (remotely exploitable, high urgency)
  6089. CVE-2017-12179 xserver-xorg-core (remotely exploitable, high urgency)
  6090. CVE-2017-12180 xserver-xorg-core (remotely exploitable, high urgency)
  6091. CVE-2017-12181 xserver-xorg-core (remotely exploitable, high urgency)
  6092. CVE-2017-12182 xserver-xorg-core (remotely exploitable, high urgency)
  6093. CVE-2017-12183 xserver-xorg-core (remotely exploitable, high urgency)
  6094. CVE-2017-12184 xserver-xorg-core (remotely exploitable, high urgency)
  6095. CVE-2017-12185 xserver-xorg-core (remotely exploitable, high urgency)
  6096. CVE-2017-12186 xserver-xorg-core (remotely exploitable, high urgency)
  6097. CVE-2017-12187 xserver-xorg-core (remotely exploitable, high urgency)
  6098. CVE-2017-13721 xserver-xorg-core (low urgency)
  6099. CVE-2017-13723 xserver-xorg-core (medium urgency)
  6100. CVE-2018-15853 libxkbcommon-x11-0 (low urgency)
  6101. CVE-2018-15854 libxkbcommon-x11-0 (low urgency)
  6102. CVE-2018-15855 libxkbcommon-x11-0 (low urgency)
  6103. CVE-2018-15856 libxkbcommon-x11-0 (low urgency)
  6104. CVE-2018-15857 libxkbcommon-x11-0 (low urgency)
  6105. CVE-2018-15858 libxkbcommon-x11-0 (low urgency)
  6106. CVE-2018-15859 libxkbcommon-x11-0 (low urgency)
  6107. CVE-2018-15861 libxkbcommon-x11-0 (low urgency)
  6108. CVE-2018-15862 libxkbcommon-x11-0 (low urgency)
  6109. CVE-2018-15863 libxkbcommon-x11-0 (low urgency)
  6110. CVE-2018-15864 libxkbcommon-x11-0 (low urgency)
  6111. CVE-2017-9118 php7.2-mbstring (remotely exploitable, medium urgency)
  6112. CVE-2017-9120 php7.2-mbstring (remotely exploitable, high urgency)
  6113. CVE-2018-17082 php7.2-mbstring
  6114. CVE-2017-11464 librsvg2-common (remotely exploitable, medium urgency)
  6115. CVE-2017-12852 python-numpy (remotely exploitable, medium urgency)
  6116. CVE-2016-9318 libxml2 (remotely exploitable, medium urgency)
  6117. CVE-2017-16932 libxml2 (remotely exploitable, medium urgency)
  6118. CVE-2017-18258 libxml2 (remotely exploitable, medium urgency)
  6119. CVE-2017-5130 libxml2 (remotely exploitable, medium urgency)
  6120. CVE-2017-5969 libxml2 (remotely exploitable, low urgency)
  6121. CVE-2017-8872 libxml2 (remotely exploitable, medium urgency)
  6122. CVE-2018-14404 libxml2 (remotely exploitable, medium urgency)
  6123. CVE-2018-14567 libxml2 (remotely exploitable, medium urgency)
  6124. CVE-2016-2779 libblkid1 (high urgency)
  6125. CVE-2018-1000654 libtasn1-6
  6126. CVE-2018-7999 libgraphite2-3 (remotely exploitable, medium urgency)
  6127. CVE-2018-5764 rsync (remotely exploitable, medium urgency)
  6128. CVE-2017-8834 libcroco3 (remotely exploitable, low urgency)
  6129. CVE-2017-8871 libcroco3 (remotely exploitable, low urgency)
  6130. CVE-2017-11462 libgssapi-krb5-2 (remotely exploitable, low urgency)
  6131. CVE-2018-5710 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  6132. CVE-2018-5729 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  6133. CVE-2018-5730 libgssapi-krb5-2 (remotely exploitable, medium urgency)
  6134. CVE-2016-4607 libxslt1.1 (remotely exploitable, high urgency)
  6135. CVE-2016-4608 libxslt1.1 (remotely exploitable, high urgency)
  6136. CVE-2016-4609 libxslt1.1 (remotely exploitable, high urgency)
  6137. CVE-2016-4610 libxslt1.1 (remotely exploitable, high urgency)
  6138. CVE-2017-2477 libxslt1.1 (remotely exploitable, high urgency)
  6139. CVE-2018-15919 ssh
  6140. CVE-2016-1516 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6141. CVE-2016-1517 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6142. CVE-2017-1000450 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6143. CVE-2017-12597 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6144. CVE-2017-12598 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6145. CVE-2017-12599 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6146. CVE-2017-12600 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
  6147. CVE-2017-12601 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6148. CVE-2017-12602 libopencv-highgui2.4-deb0 (remotely exploitable, high urgency)
  6149. CVE-2017-12603 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6150. CVE-2017-12604 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6151. CVE-2017-12605 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6152. CVE-2017-12606 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6153. CVE-2017-12862 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6154. CVE-2017-12863 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6155. CVE-2017-12864 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6156. CVE-2017-17760 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6157. CVE-2018-5268 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6158. CVE-2018-5269 libopencv-highgui2.4-deb0 (remotely exploitable, medium urgency)
  6159. CVE-2018-7712 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  6160. CVE-2018-7713 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  6161. CVE-2018-7714 libopencv-highgui2.4-deb0 (remotely exploitable, low urgency)
  6162. CVE-2017-14107 libzip4 (remotely exploitable, medium urgency)
  6163. CVE-2017-9118 php7.2-bz2 (remotely exploitable, medium urgency)
  6164. CVE-2017-9120 php7.2-bz2 (remotely exploitable, high urgency)
  6165. CVE-2018-17082 php7.2-bz2
  6166. CVE-2016-10040 libqt5sql5-sqlite (remotely exploitable, medium urgency)
  6167. CVE-2017-1000418 libwildmidi-config (remotely exploitable, medium urgency)
  6168. CVE-2017-11661 libwildmidi-config (remotely exploitable, low urgency)
  6169. CVE-2017-11662 libwildmidi-config (remotely exploitable, low urgency)
  6170. CVE-2017-11663 libwildmidi-config (remotely exploitable, low urgency)
  6171. CVE-2017-11664 libwildmidi-config (remotely exploitable, low urgency)
  6172. CVE-2017-9118 php7.2-readline (remotely exploitable, medium urgency)
  6173. CVE-2017-9120 php7.2-readline (remotely exploitable, high urgency)
  6174. CVE-2018-17082 php7.2-readline
  6175. CVE-2017-12562 libsndfile1 (remotely exploitable, high urgency)
  6176. CVE-2017-14245 libsndfile1 (remotely exploitable, low urgency)
  6177. CVE-2017-14246 libsndfile1 (remotely exploitable, low urgency)
  6178. CVE-2017-14634 libsndfile1 (remotely exploitable, medium urgency)
  6179. CVE-2017-17456 libsndfile1 (remotely exploitable, low urgency)
  6180. CVE-2017-17457 libsndfile1 (remotely exploitable, low urgency)
  6181. CVE-2017-6892 libsndfile1 (remotely exploitable, medium urgency)
  6182. CVE-2018-13419 libsndfile1 (remotely exploitable, low urgency)
  6183. CVE-2018-0732 libssl1.0.2 (remotely exploitable, low urgency)
  6184. CVE-2018-0737 libssl1.0.2 (remotely exploitable, low urgency)
  6185. CVE-2017-18248 libcupsimage2 (remotely exploitable, low urgency)
  6186. CVE-2017-9216 libjbig2dec0 (remotely exploitable, medium urgency)
  6187. CVE-2018-14598 libx11-xcb1 (low urgency)
  6188. CVE-2018-14599 libx11-xcb1 (low urgency)
  6189. CVE-2018-14600 libx11-xcb1 (low urgency)
  6190. CVE-2016-9811 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  6191. CVE-2017-5837 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  6192. CVE-2017-5844 libgstreamer-plugins-base0.10-0 (remotely exploitable, medium urgency)
  6193. CVE-2018-5740 libisccc140
  6194. CVE-2017-13712 libmp3lame0 (remotely exploitable, low urgency)
  6195. CVE-2017-15019 libmp3lame0 (remotely exploitable, medium urgency)
  6196. CVE-2015-9262 libxcursor1 (remotely exploitable, high urgency)
  6197. CVE-2018-16428 libglib2.0-data (low urgency)
  6198. CVE-2018-16429 libglib2.0-data (low urgency)
  6199. CVE-2017-13704 dnsmasq (remotely exploitable, medium urgency)
  6200. CVE-2017-14491 dnsmasq (remotely exploitable, high urgency)
  6201. CVE-2017-14492 dnsmasq (remotely exploitable, high urgency)
  6202. CVE-2017-14493 dnsmasq (remotely exploitable, high urgency)
  6203. CVE-2017-14494 dnsmasq (remotely exploitable, medium urgency)
  6204. CVE-2017-14495 dnsmasq (remotely exploitable, medium urgency)
  6205. CVE-2017-14496 dnsmasq (remotely exploitable, high urgency)
  6206. CVE-2017-15107 dnsmasq (remotely exploitable, medium urgency)
  6207. CVE-2017-12424 passwd (remotely exploitable, high urgency)
  6208. CVE-2018-7169 passwd (remotely exploitable, medium urgency)
  6209. CVE-2017-9118 php7.2 (remotely exploitable, medium urgency)
  6210. CVE-2017-9120 php7.2 (remotely exploitable, high urgency)
  6211. CVE-2018-17082 php7.2
  6212. CVE-2018-15919 openssh-server
  6213. CVE-2016-2568 libpolkit-backend-1-0 (medium urgency)
  6214. CVE-2018-1116 libpolkit-backend-1-0 (low urgency)
  6215. CVE-2018-15919 openssh-sftp-server
  6216. CVE-2018-15607 libmagickwand-6.q16-6 (low urgency)
  6217. CVE-2018-16323 libmagickwand-6.q16-6
  6218. CVE-2018-16412 libmagickwand-6.q16-6
  6219. CVE-2018-16413 libmagickwand-6.q16-6
  6220. CVE-2018-16644 libmagickwand-6.q16-6
  6221. CVE-2018-16645 libmagickwand-6.q16-6
  6222. CVE-2018-18024 libmagickwand-6.q16-6 (low urgency)
  6223. CVE-2018-18025 libmagickwand-6.q16-6
  6224. CVE-2018-10754 ncurses-base (remotely exploitable, low urgency)
  6225. CVE-2016-10228 libc-bin (remotely exploitable, medium urgency)
  6226. CVE-2017-1000445 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6227. CVE-2017-1000476 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6228. CVE-2017-11531 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6229. CVE-2017-11532 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6230. CVE-2017-11534 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6231. CVE-2017-11539 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6232. CVE-2017-11644 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6233. CVE-2017-11724 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6234. CVE-2017-11751 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6235. CVE-2017-11752 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6236. CVE-2017-12140 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6237. CVE-2017-12418 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6238. CVE-2017-12427 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6239. CVE-2017-12429 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6240. CVE-2017-12430 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6241. CVE-2017-12433 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6242. CVE-2017-12435 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6243. CVE-2017-12563 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6244. CVE-2017-12564 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6245. CVE-2017-12565 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6246. CVE-2017-12566 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6247. CVE-2017-12641 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6248. CVE-2017-12642 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6249. CVE-2017-12643 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6250. CVE-2017-12654 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6251. CVE-2017-12664 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6252. CVE-2017-12665 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6253. CVE-2017-12668 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6254. CVE-2017-12670 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6255. CVE-2017-12674 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6256. CVE-2017-12675 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6257. CVE-2017-12676 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6258. CVE-2017-12691 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6259. CVE-2017-12692 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6260. CVE-2017-12693 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6261. CVE-2017-12875 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6262. CVE-2017-13061 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6263. CVE-2017-13133 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6264. CVE-2017-13146 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6265. CVE-2017-13658 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6266. CVE-2017-13768 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6267. CVE-2017-14060 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6268. CVE-2017-14172 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6269. CVE-2017-14173 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6270. CVE-2017-14174 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6271. CVE-2017-14175 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6272. CVE-2017-14249 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6273. CVE-2017-14341 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6274. CVE-2017-14400 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6275. CVE-2017-14505 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6276. CVE-2017-14528 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6277. CVE-2017-14532 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6278. CVE-2017-14624 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6279. CVE-2017-14625 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6280. CVE-2017-14626 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6281. CVE-2017-14739 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6282. CVE-2017-14741 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6283. CVE-2017-15015 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6284. CVE-2017-15016 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6285. CVE-2017-15017 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6286. CVE-2017-15217 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6287. CVE-2017-15281 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6288. CVE-2017-17681 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6289. CVE-2017-17682 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6290. CVE-2017-17914 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6291. CVE-2017-18209 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6292. CVE-2017-18211 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6293. CVE-2017-18252 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6294. CVE-2017-18271 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6295. CVE-2017-18273 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6296. CVE-2018-10177 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6297. CVE-2018-10804 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6298. CVE-2018-10805 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6299. CVE-2018-14551 libmagickcore-6.q16-3-extra (remotely exploitable, high urgency)
  6300. CVE-2018-15607 libmagickcore-6.q16-3-extra (low urgency)
  6301. CVE-2018-16323 libmagickcore-6.q16-3-extra
  6302. CVE-2018-16643 libmagickcore-6.q16-3-extra (low urgency)
  6303. CVE-2018-16749 libmagickcore-6.q16-3-extra (low urgency)
  6304. CVE-2018-18024 libmagickcore-6.q16-3-extra (low urgency)
  6305. CVE-2018-18025 libmagickcore-6.q16-3-extra
  6306. CVE-2018-7443 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6307. CVE-2018-8804 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6308. CVE-2018-8960 libmagickcore-6.q16-3-extra (remotely exploitable, low urgency)
  6309. CVE-2018-9133 libmagickcore-6.q16-3-extra (remotely exploitable, medium urgency)
  6310. CVE-2016-10040 libqt5xml5 (remotely exploitable, medium urgency)
  6311. CVE-2018-15607 libmagickcore-6.q16-6 (low urgency)
  6312. CVE-2018-16323 libmagickcore-6.q16-6
  6313. CVE-2018-16412 libmagickcore-6.q16-6
  6314. CVE-2018-16413 libmagickcore-6.q16-6
  6315. CVE-2018-16644 libmagickcore-6.q16-6
  6316. CVE-2018-16645 libmagickcore-6.q16-6
  6317. CVE-2018-18024 libmagickcore-6.q16-6 (low urgency)
  6318. CVE-2018-18025 libmagickcore-6.q16-6
  6319. CVE-2018-1049 udev (remotely exploitable, medium urgency)
  6320. CVE-2018-6954 udev (high urgency)
  6321. CVE-2017-11399 libswscale4 (remotely exploitable, medium urgency)
  6322. CVE-2017-11665 libswscale4 (remotely exploitable, medium urgency)
  6323. CVE-2017-11719 libswscale4 (remotely exploitable, medium urgency)
  6324. CVE-2017-14054 libswscale4 (remotely exploitable, high urgency)
  6325. CVE-2017-14055 libswscale4 (remotely exploitable, high urgency)
  6326. CVE-2017-14056 libswscale4 (remotely exploitable, high urgency)
  6327. CVE-2017-14057 libswscale4 (remotely exploitable, high urgency)
  6328. CVE-2017-14058 libswscale4 (remotely exploitable, medium urgency)
  6329. CVE-2017-14059 libswscale4 (remotely exploitable, high urgency)
  6330. CVE-2017-14169 libswscale4 (remotely exploitable, medium urgency)
  6331. CVE-2017-14170 libswscale4 (remotely exploitable, high urgency)
  6332. CVE-2017-14171 libswscale4 (remotely exploitable, high urgency)
  6333. CVE-2017-14222 libswscale4 (remotely exploitable, high urgency)
  6334. CVE-2017-14223 libswscale4 (remotely exploitable, high urgency)
  6335. CVE-2017-14225 libswscale4 (remotely exploitable, medium urgency)
  6336. CVE-2017-14767 libswscale4 (remotely exploitable, medium urgency)
  6337. CVE-2017-15186 libswscale4 (remotely exploitable, medium urgency)
  6338. CVE-2017-15672 libswscale4 (remotely exploitable, medium urgency)
  6339. CVE-2017-16840 libswscale4 (remotely exploitable, high urgency)
  6340. CVE-2017-17081 libswscale4 (remotely exploitable, medium urgency)
  6341. CVE-2017-9608 libswscale4 (remotely exploitable, medium urgency)
  6342. CVE-2018-10001 libswscale4 (remotely exploitable, medium urgency)
  6343. CVE-2018-12458 libswscale4 (remotely exploitable, medium urgency)
  6344. CVE-2018-12459 libswscale4 (remotely exploitable, low urgency)
  6345. CVE-2018-13300 libswscale4 (remotely exploitable, medium urgency)
  6346. CVE-2018-13301 libswscale4 (remotely exploitable, low urgency)
  6347. CVE-2018-13302 libswscale4 (remotely exploitable, medium urgency)
  6348. CVE-2018-13303 libswscale4 (remotely exploitable, medium urgency)
  6349. CVE-2018-13304 libswscale4 (remotely exploitable, medium urgency)
  6350. CVE-2018-14394 libswscale4 (remotely exploitable, medium urgency)
  6351. CVE-2018-14395 libswscale4 (remotely exploitable, medium urgency)
  6352. CVE-2018-15822 libswscale4 (low urgency)
  6353. CVE-2018-1999010 libswscale4 (remotely exploitable, high urgency)
  6354. CVE-2018-1999011 libswscale4 (remotely exploitable, medium urgency)
  6355. CVE-2018-1999012 libswscale4 (remotely exploitable, high urgency)
  6356. CVE-2018-1999013 libswscale4 (remotely exploitable, medium urgency)
  6357. CVE-2018-1999014 libswscale4 (remotely exploitable, medium urgency)
  6358. CVE-2018-1999015 libswscale4 (remotely exploitable, medium urgency)
  6359. CVE-2018-6392 libswscale4 (remotely exploitable, medium urgency)
  6360. CVE-2018-6621 libswscale4 (remotely exploitable, medium urgency)
  6361. CVE-2018-6912 libswscale4 (remotely exploitable, low urgency)
  6362. CVE-2018-7557 libswscale4 (remotely exploitable, medium urgency)
  6363. CVE-2018-7751 libswscale4 (remotely exploitable, medium urgency)
  6364. CVE-2018-9841 libswscale4 (remotely exploitable, low urgency)
  6365. CVE-2017-9118 php7.2-cli (remotely exploitable, medium urgency)
  6366. CVE-2017-9120 php7.2-cli (remotely exploitable, high urgency)
  6367. CVE-2018-17082 php7.2-cli
  6368. CVE-2016-10040 libqt5gui5 (remotely exploitable, medium urgency)
  6369. CVE-2018-14622 libtirpc1
  6370. CVE-2018-4117 chromium-codecs-ffmpeg-extra (remotely exploitable, medium urgency)
  6371. CVE-2018-0732 libssl1.1 (remotely exploitable, medium urgency)
  6372. CVE-2018-0737 libssl1.1 (remotely exploitable, medium urgency)
  6373. CVE-2017-12618 libaprutil1 (low urgency)
  6374. CVE-2016-10228 libc-l10n (remotely exploitable, medium urgency)
  6375. CVE-2018-1049 systemd (remotely exploitable, medium urgency)
  6376. CVE-2018-6954 systemd (high urgency)
  6377. CVE-2018-5740 liblwres141
  6378. CVE-2016-10040 libqt5sql5 (remotely exploitable, medium urgency)
  6379. CVE-2017-1000445 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6380. CVE-2017-1000476 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6381. CVE-2017-11531 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6382. CVE-2017-11532 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6383. CVE-2017-11534 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6384. CVE-2017-11539 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6385. CVE-2017-11644 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6386. CVE-2017-11724 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6387. CVE-2017-11751 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6388. CVE-2017-11752 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6389. CVE-2017-12140 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6390. CVE-2017-12418 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6391. CVE-2017-12427 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6392. CVE-2017-12429 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6393. CVE-2017-12430 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6394. CVE-2017-12433 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6395. CVE-2017-12435 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6396. CVE-2017-12563 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6397. CVE-2017-12564 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6398. CVE-2017-12565 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6399. CVE-2017-12566 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6400. CVE-2017-12641 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6401. CVE-2017-12642 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6402. CVE-2017-12643 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6403. CVE-2017-12654 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6404. CVE-2017-12664 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6405. CVE-2017-12665 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6406. CVE-2017-12668 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6407. CVE-2017-12670 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6408. CVE-2017-12674 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6409. CVE-2017-12675 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6410. CVE-2017-12676 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6411. CVE-2017-12691 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6412. CVE-2017-12692 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6413. CVE-2017-12693 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6414. CVE-2017-12875 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6415. CVE-2017-13061 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6416. CVE-2017-13133 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6417. CVE-2017-13146 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6418. CVE-2017-13658 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6419. CVE-2017-13768 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6420. CVE-2017-14060 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6421. CVE-2017-14172 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6422. CVE-2017-14173 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6423. CVE-2017-14174 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6424. CVE-2017-14175 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6425. CVE-2017-14249 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6426. CVE-2017-14341 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6427. CVE-2017-14400 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6428. CVE-2017-14505 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6429. CVE-2017-14528 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6430. CVE-2017-14532 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6431. CVE-2017-14624 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6432. CVE-2017-14625 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6433. CVE-2017-14626 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6434. CVE-2017-14739 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6435. CVE-2017-14741 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6436. CVE-2017-15015 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6437. CVE-2017-15016 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6438. CVE-2017-15017 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6439. CVE-2017-15217 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6440. CVE-2017-15281 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6441. CVE-2017-17681 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6442. CVE-2017-17682 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6443. CVE-2017-17914 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6444. CVE-2017-18209 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6445. CVE-2017-18211 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6446. CVE-2017-18252 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6447. CVE-2017-18271 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6448. CVE-2017-18273 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6449. CVE-2018-10177 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6450. CVE-2018-10804 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6451. CVE-2018-10805 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6452. CVE-2018-14551 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
  6453. CVE-2018-15607 libmagickwand-6.q16-3 (low urgency)
  6454. CVE-2018-16323 libmagickwand-6.q16-3
  6455. CVE-2018-16643 libmagickwand-6.q16-3 (low urgency)
  6456. CVE-2018-16749 libmagickwand-6.q16-3 (low urgency)
  6457. CVE-2018-18024 libmagickwand-6.q16-3 (low urgency)
  6458. CVE-2018-18025 libmagickwand-6.q16-3
  6459. CVE-2018-7443 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6460. CVE-2018-8804 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6461. CVE-2018-8960 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
  6462. CVE-2018-9133 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
  6463. CVE-2018-0732 openssl (remotely exploitable, medium urgency)
  6464. CVE-2018-0737 openssl (remotely exploitable, medium urgency)
  6465. CVE-2017-11399 libpostproc54 (remotely exploitable, medium urgency)
  6466. CVE-2017-11665 libpostproc54 (remotely exploitable, medium urgency)
  6467. CVE-2017-11719 libpostproc54 (remotely exploitable, medium urgency)
  6468. CVE-2017-14054 libpostproc54 (remotely exploitable, high urgency)
  6469. CVE-2017-14055 libpostproc54 (remotely exploitable, high urgency)
  6470. CVE-2017-14056 libpostproc54 (remotely exploitable, high urgency)
  6471. CVE-2017-14057 libpostproc54 (remotely exploitable, high urgency)
  6472. CVE-2017-14058 libpostproc54 (remotely exploitable, medium urgency)
  6473. CVE-2017-14059 libpostproc54 (remotely exploitable, high urgency)
  6474. CVE-2017-14169 libpostproc54 (remotely exploitable, medium urgency)
  6475. CVE-2017-14170 libpostproc54 (remotely exploitable, high urgency)
  6476. CVE-2017-14171 libpostproc54 (remotely exploitable, high urgency)
  6477. CVE-2017-14222 libpostproc54 (remotely exploitable, high urgency)
  6478. CVE-2017-14223 libpostproc54 (remotely exploitable, high urgency)
  6479. CVE-2017-14225 libpostproc54 (remotely exploitable, medium urgency)
  6480. CVE-2017-14767 libpostproc54 (remotely exploitable, medium urgency)
  6481. CVE-2017-15186 libpostproc54 (remotely exploitable, medium urgency)
  6482. CVE-2017-15672 libpostproc54 (remotely exploitable, medium urgency)
  6483. CVE-2017-16840 libpostproc54 (remotely exploitable, high urgency)
  6484. CVE-2017-17081 libpostproc54 (remotely exploitable, medium urgency)
  6485. CVE-2017-9608 libpostproc54 (remotely exploitable, medium urgency)
  6486. CVE-2018-10001 libpostproc54 (remotely exploitable, medium urgency)
  6487. CVE-2018-12458 libpostproc54 (remotely exploitable, medium urgency)
  6488. CVE-2018-12459 libpostproc54 (remotely exploitable, low urgency)
  6489. CVE-2018-13300 libpostproc54 (remotely exploitable, medium urgency)
  6490. CVE-2018-13301 libpostproc54 (remotely exploitable, low urgency)
  6491. CVE-2018-13302 libpostproc54 (remotely exploitable, medium urgency)
  6492. CVE-2018-13303 libpostproc54 (remotely exploitable, medium urgency)
  6493. CVE-2018-13304 libpostproc54 (remotely exploitable, medium urgency)
  6494. CVE-2018-14394 libpostproc54 (remotely exploitable, medium urgency)
  6495. CVE-2018-14395 libpostproc54 (remotely exploitable, medium urgency)
  6496. CVE-2018-15822 libpostproc54 (low urgency)
  6497. CVE-2018-1999010 libpostproc54 (remotely exploitable, high urgency)
  6498. CVE-2018-1999011 libpostproc54 (remotely exploitable, medium urgency)
  6499. CVE-2018-1999012 libpostproc54 (remotely exploitable, high urgency)
  6500. CVE-2018-1999013 libpostproc54 (remotely exploitable, medium urgency)
  6501. CVE-2018-1999014 libpostproc54 (remotely exploitable, medium urgency)
  6502. CVE-2018-1999015 libpostproc54 (remotely exploitable, medium urgency)
  6503. CVE-2018-6392 libpostproc54 (remotely exploitable, medium urgency)
  6504. CVE-2018-6621 libpostproc54 (remotely exploitable, medium urgency)
  6505. CVE-2018-6912 libpostproc54 (remotely exploitable, low urgency)
  6506. CVE-2018-7557 libpostproc54 (remotely exploitable, medium urgency)
  6507. CVE-2018-7751 libpostproc54 (remotely exploitable, medium urgency)
  6508. CVE-2018-9841 libpostproc54 (remotely exploitable, low urgency)
  6509. CVE-2017-17087 vim-common (low urgency)
  6510. CVE-2018-8740 libsqlite3-0 (remotely exploitable, medium urgency)
  6511. CVE-2018-15607 imagemagick (low urgency)
  6512. CVE-2018-16323 imagemagick
  6513. CVE-2018-16412 imagemagick
  6514. CVE-2018-16413 imagemagick
  6515. CVE-2018-16644 imagemagick
  6516. CVE-2018-16645 imagemagick
  6517. CVE-2018-18024 imagemagick (low urgency)
  6518. CVE-2018-18025 imagemagick
  6519. CVE-2018-18074 python3-requests (low urgency)
  6520. CVE-2017-13704 dnsmasq-base (remotely exploitable, medium urgency)
  6521. CVE-2017-14491 dnsmasq-base (remotely exploitable, high urgency)
  6522. CVE-2017-14492 dnsmasq-base (remotely exploitable, high urgency)
  6523. CVE-2017-14493 dnsmasq-base (remotely exploitable, high urgency)
  6524. CVE-2017-14494 dnsmasq-base (remotely exploitable, medium urgency)
  6525. CVE-2017-14495 dnsmasq-base (remotely exploitable, medium urgency)
  6526. CVE-2017-14496 dnsmasq-base (remotely exploitable, high urgency)
  6527. CVE-2017-15107 dnsmasq-base (remotely exploitable, medium urgency)
  6528. CVE-2018-18074 python-requests (low urgency)
  6529. CVE-2018-15853 libxkbcommon0 (low urgency)
  6530. CVE-2018-15854 libxkbcommon0 (low urgency)
  6531. CVE-2018-15855 libxkbcommon0 (low urgency)
  6532. CVE-2018-15856 libxkbcommon0 (low urgency)
  6533. CVE-2018-15857 libxkbcommon0 (low urgency)
  6534. CVE-2018-15858 libxkbcommon0 (low urgency)
  6535. CVE-2018-15859 libxkbcommon0 (low urgency)
  6536. CVE-2018-15861 libxkbcommon0 (low urgency)
  6537. CVE-2018-15862 libxkbcommon0 (low urgency)
  6538. CVE-2018-15863 libxkbcommon0 (low urgency)
  6539. CVE-2018-15864 libxkbcommon0 (low urgency)
  6540. CVE-2018-1000807 python3-openssl
  6541. CVE-2018-1000808 python3-openssl (low urgency)
  6542. CVE-2017-9118 php7.2-json (remotely exploitable, medium urgency)
  6543. CVE-2017-9120 php7.2-json (remotely exploitable, high urgency)
  6544. CVE-2018-17082 php7.2-json
  6545. CVE-2017-9118 php7.2-intl (remotely exploitable, medium urgency)
  6546. CVE-2017-9120 php7.2-intl (remotely exploitable, high urgency)
  6547. CVE-2018-17082 php7.2-intl
  6548. CVE-2017-13884 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6549. CVE-2017-13885 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6550. CVE-2017-7153 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6551. CVE-2017-7160 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6552. CVE-2017-7161 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6553. CVE-2017-7165 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6554. CVE-2018-4088 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6555. CVE-2018-4089 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6556. CVE-2018-4096 libjavascriptcoregtk-4.0-18 (remotely exploitable, medium urgency)
  6557. CVE-2017-11462 libkrb5-3 (remotely exploitable, low urgency)
  6558. CVE-2018-5710 libkrb5-3 (remotely exploitable, medium urgency)
  6559. CVE-2018-5729 libkrb5-3 (remotely exploitable, medium urgency)
  6560. CVE-2018-5730 libkrb5-3 (remotely exploitable, medium urgency)
  6561. CVE-2017-11671 gcc-4.9-base (low urgency)
  6562. CVE-2017-12448 binutils (remotely exploitable, medium urgency)
  6563. CVE-2017-12449 binutils (remotely exploitable, medium urgency)
  6564. CVE-2017-12450 binutils (remotely exploitable, medium urgency)
  6565. CVE-2017-12451 binutils (remotely exploitable, medium urgency)
  6566. CVE-2017-12452 binutils (remotely exploitable, medium urgency)
  6567. CVE-2017-12453 binutils (remotely exploitable, medium urgency)
  6568. CVE-2017-12454 binutils (remotely exploitable, medium urgency)
  6569. CVE-2017-12455 binutils (remotely exploitable, medium urgency)
  6570. CVE-2017-12456 binutils (remotely exploitable, medium urgency)
  6571. CVE-2017-12457 binutils (remotely exploitable, medium urgency)
  6572. CVE-2017-12458 binutils (remotely exploitable, medium urgency)
  6573. CVE-2017-12459 binutils (remotely exploitable, medium urgency)
  6574. CVE-2017-12799 binutils (remotely exploitable, medium urgency)
  6575. CVE-2017-12967 binutils (remotely exploitable, medium urgency)
  6576. CVE-2017-13710 binutils (remotely exploitable, medium urgency)
  6577. CVE-2017-13716 binutils (remotely exploitable, low urgency)
  6578. CVE-2017-13757 binutils (remotely exploitable, medium urgency)
  6579. CVE-2017-14128 binutils (remotely exploitable, low urgency)
  6580. CVE-2017-14129 binutils (remotely exploitable, low urgency)
  6581. CVE-2017-14130 binutils (remotely exploitable, low urgency)
  6582. CVE-2017-14333 binutils (remotely exploitable, medium urgency)
  6583. CVE-2017-14529 binutils (remotely exploitable, medium urgency)
  6584. CVE-2017-14729 binutils (remotely exploitable, medium urgency)
  6585. CVE-2017-14745 binutils (remotely exploitable, medium urgency)
  6586. CVE-2017-14930 binutils (remotely exploitable, high urgency)
  6587. CVE-2017-14932 binutils (remotely exploitable, medium urgency)
  6588. CVE-2017-14933 binutils (remotely exploitable, medium urgency)
  6589. CVE-2017-14934 binutils (remotely exploitable, medium urgency)
  6590. CVE-2017-14938 binutils (remotely exploitable, medium urgency)
  6591. CVE-2017-14939 binutils (remotely exploitable, medium urgency)
  6592. CVE-2017-14940 binutils (remotely exploitable, medium urgency)
  6593. CVE-2017-14974 binutils (remotely exploitable, medium urgency)
  6594. CVE-2017-15020 binutils (remotely exploitable, medium urgency)
  6595. CVE-2017-15021 binutils (remotely exploitable, medium urgency)
  6596. CVE-2017-15022 binutils (remotely exploitable, medium urgency)
  6597. CVE-2017-15023 binutils (remotely exploitable, medium urgency)
  6598. CVE-2017-15024 binutils (remotely exploitable, medium urgency)
  6599. CVE-2017-15025 binutils (remotely exploitable, medium urgency)
  6600. CVE-2017-15225 binutils (remotely exploitable, medium urgency)
  6601. CVE-2017-15938 binutils (remotely exploitable, medium urgency)
  6602. CVE-2017-15996 binutils (remotely exploitable, medium urgency)
  6603. CVE-2017-16826 binutils (remotely exploitable, medium urgency)
  6604. CVE-2017-16827 binutils (remotely exploitable, medium urgency)
  6605. CVE-2017-16828 binutils (remotely exploitable, medium urgency)
  6606. CVE-2017-16829 binutils (remotely exploitable, medium urgency)
  6607. CVE-2017-16830 binutils (remotely exploitable, medium urgency)
  6608. CVE-2017-16831 binutils (remotely exploitable, medium urgency)
  6609. CVE-2017-16832 binutils (remotely exploitable, medium urgency)
  6610. CVE-2017-17080 binutils (remotely exploitable, medium urgency)
  6611. CVE-2017-17121 binutils (remotely exploitable, medium urgency)
  6612. CVE-2017-17122 binutils (remotely exploitable, medium urgency)
  6613. CVE-2017-17123 binutils (remotely exploitable, medium urgency)
  6614. CVE-2017-17124 binutils (remotely exploitable, medium urgency)
  6615. CVE-2017-17125 binutils (remotely exploitable, medium urgency)
  6616. CVE-2017-17126 binutils (remotely exploitable, medium urgency)
  6617. CVE-2017-9038 binutils (remotely exploitable, low urgency)
  6618. CVE-2017-9039 binutils (remotely exploitable, low urgency)
  6619. CVE-2017-9040 binutils (remotely exploitable, low urgency)
  6620. CVE-2017-9041 binutils (remotely exploitable, low urgency)
  6621. CVE-2017-9042 binutils (remotely exploitable, low urgency)
  6622. CVE-2017-9043 binutils (remotely exploitable, low urgency)
  6623. CVE-2017-9044 binutils (remotely exploitable, low urgency)
  6624. CVE-2017-9742 binutils (remotely exploitable, low urgency)
  6625. CVE-2017-9743 binutils (remotely exploitable, low urgency)
  6626. CVE-2017-9744 binutils (remotely exploitable, low urgency)
  6627. CVE-2017-9745 binutils (remotely exploitable, low urgency)
  6628. CVE-2017-9746 binutils (remotely exploitable, low urgency)
  6629. CVE-2017-9747 binutils (remotely exploitable, low urgency)
  6630. CVE-2017-9748 binutils (remotely exploitable, low urgency)
  6631. CVE-2017-9749 binutils (remotely exploitable, low urgency)
  6632. CVE-2017-9750 binutils (remotely exploitable, low urgency)
  6633. CVE-2017-9751 binutils (remotely exploitable, low urgency)
  6634. CVE-2017-9752 binutils (remotely exploitable, low urgency)
  6635. CVE-2017-9753 binutils (remotely exploitable, low urgency)
  6636. CVE-2017-9754 binutils (remotely exploitable, low urgency)
  6637. CVE-2017-9755 binutils (remotely exploitable, low urgency)
  6638. CVE-2017-9756 binutils (remotely exploitable, low urgency)
  6639. CVE-2017-9954 binutils (remotely exploitable, medium urgency)
  6640. CVE-2017-9955 binutils (remotely exploitable, medium urgency)
  6641. CVE-2018-10372 binutils (remotely exploitable, medium urgency)
  6642. CVE-2018-10373 binutils (remotely exploitable, medium urgency)
  6643. CVE-2018-10534 binutils (remotely exploitable, medium urgency)
  6644. CVE-2018-10535 binutils (remotely exploitable, medium urgency)
  6645. CVE-2018-12641 binutils (remotely exploitable, low urgency)
  6646. CVE-2018-12697 binutils (remotely exploitable, low urgency)
  6647. CVE-2018-12698 binutils (remotely exploitable, low urgency)
  6648. CVE-2018-12699 binutils (remotely exploitable, low urgency)
  6649. CVE-2018-12700 binutils (remotely exploitable, low urgency)
  6650. CVE-2018-12934 binutils (remotely exploitable, low urgency)
  6651. CVE-2018-13033 binutils (remotely exploitable, low urgency)
  6652. CVE-2018-17358 binutils
  6653. CVE-2018-17359 binutils
  6654. CVE-2018-17360 binutils
  6655. CVE-2018-17794 binutils (low urgency)
  6656. CVE-2018-17985 binutils
  6657. CVE-2018-18309 binutils
  6658. CVE-2018-6323 binutils (remotely exploitable, medium urgency)
  6659. CVE-2018-6543 binutils (remotely exploitable, medium urgency)
  6660. CVE-2018-6759 binutils (remotely exploitable, medium urgency)
  6661. CVE-2018-6872 binutils (remotely exploitable, medium urgency)
  6662. CVE-2018-7208 binutils (remotely exploitable, medium urgency)
  6663. CVE-2018-7568 binutils (remotely exploitable, medium urgency)
  6664. CVE-2018-7569 binutils (remotely exploitable, medium urgency)
  6665. CVE-2018-7570 binutils (remotely exploitable, medium urgency)
  6666. CVE-2018-7642 binutils (remotely exploitable, medium urgency)
  6667. CVE-2018-7643 binutils (remotely exploitable, medium urgency)
  6668. CVE-2018-8945 binutils (remotely exploitable, low urgency)
  6669. CVE-2018-9138 binutils (remotely exploitable, low urgency)
  6670. CVE-2018-9996 binutils (remotely exploitable, low urgency)
  6671. CVE-2017-18198 libcdio-paranoia1 (remotely exploitable, low urgency)
  6672. CVE-2017-18199 libcdio-paranoia1 (remotely exploitable, low urgency)
  6673. CVE-2016-10228 libc-dev-bin (remotely exploitable, medium urgency)
  6674. CVE-2017-17446 libgme0 (remotely exploitable, medium urgency)
  6675. CVE-2016-10040 qt5-gtk-platformtheme (remotely exploitable, medium urgency)
  6676. CVE-2018-14048 libpng-dev (remotely exploitable, medium urgency)
  6677. CVE-2018-5740 libbind9-140
  6678. CVE-2017-10268 mariadb-server (low urgency)
  6679. CVE-2017-10378 mariadb-server (remotely exploitable, medium urgency)
  6680. CVE-2017-15365 mariadb-server (remotely exploitable, medium urgency)
  6681. CVE-2017-3636 mariadb-server (medium urgency)
  6682. CVE-2017-3641 mariadb-server (remotely exploitable, medium urgency)
  6683. CVE-2017-3653 mariadb-server (remotely exploitable, low urgency)
  6684. CVE-2018-2562 mariadb-server (remotely exploitable, high urgency)
  6685. CVE-2018-2612 mariadb-server (remotely exploitable, high urgency)
  6686. CVE-2018-2622 mariadb-server (remotely exploitable, medium urgency)
  6687. CVE-2018-2640 mariadb-server (remotely exploitable, medium urgency)
  6688. CVE-2018-2665 mariadb-server (remotely exploitable, medium urgency)
  6689. CVE-2018-2668 mariadb-server (remotely exploitable, medium urgency)
  6690. CVE-2018-2755 mariadb-server (low urgency)
  6691. CVE-2018-2761 mariadb-server (remotely exploitable, medium urgency)
  6692. CVE-2018-2766 mariadb-server (remotely exploitable, medium urgency)
  6693. CVE-2018-2767 mariadb-server (remotely exploitable, low urgency)
  6694. CVE-2018-2771 mariadb-server (remotely exploitable, low urgency)
  6695. CVE-2018-2781 mariadb-server (remotely exploitable, medium urgency)
  6696. CVE-2018-2782 mariadb-server (remotely exploitable, medium urgency)
  6697. CVE-2018-2784 mariadb-server (remotely exploitable, medium urgency)
  6698. CVE-2018-2787 mariadb-server (remotely exploitable, medium urgency)
  6699. CVE-2018-2813 mariadb-server (remotely exploitable, medium urgency)
  6700. CVE-2018-2817 mariadb-server (remotely exploitable, medium urgency)
  6701. CVE-2018-2819 mariadb-server (remotely exploitable, medium urgency)
  6702. CVE-2018-3058 mariadb-server (remotely exploitable, medium urgency)
  6703. CVE-2018-3063 mariadb-server (remotely exploitable, medium urgency)
  6704. CVE-2018-3064 mariadb-server (remotely exploitable, medium urgency)
  6705. CVE-2018-3066 mariadb-server (remotely exploitable, medium urgency)
  6706. CVE-2018-3081 mariadb-server (remotely exploitable, medium urgency)
  6707. CVE-2016-2779 libmount1 (high urgency)
  6708. CVE-2018-1000656 python-flask
  6709. CVE-2017-14160 libvorbisenc2 (remotely exploitable, medium urgency)
  6710. CVE-2018-10392 libvorbisenc2 (remotely exploitable, medium urgency)
  6711. CVE-2018-10393 libvorbisenc2 (remotely exploitable, medium urgency)
  6712. CVE-2018-1000223 libsoundtouch1 (remotely exploitable, medium urgency)
  6713. CVE-2018-14044 libsoundtouch1 (remotely exploitable, low urgency)
  6714. CVE-2018-14045 libsoundtouch1 (remotely exploitable, low urgency)
  6715. CVE-2018-17096 libsoundtouch1 (low urgency)
  6716. CVE-2018-17097 libsoundtouch1 (low urgency)
  6717. CVE-2018-17098 libsoundtouch1 (low urgency)
  6718. CVE-2016-1516 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6719. CVE-2016-1517 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6720. CVE-2017-1000450 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6721. CVE-2017-12597 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6722. CVE-2017-12598 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6723. CVE-2017-12599 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6724. CVE-2017-12600 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
  6725. CVE-2017-12601 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6726. CVE-2017-12602 libopencv-objdetect2.4v5 (remotely exploitable, high urgency)
  6727. CVE-2017-12603 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6728. CVE-2017-12604 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6729. CVE-2017-12605 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6730. CVE-2017-12606 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6731. CVE-2017-12862 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6732. CVE-2017-12863 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6733. CVE-2017-12864 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6734. CVE-2017-17760 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6735. CVE-2018-5268 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6736. CVE-2018-5269 libopencv-objdetect2.4v5 (remotely exploitable, medium urgency)
  6737. CVE-2018-7712 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  6738. CVE-2018-7713 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  6739. CVE-2018-7714 libopencv-objdetect2.4v5 (remotely exploitable, low urgency)
  6740. CVE-2016-1516 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6741. CVE-2016-1517 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6742. CVE-2017-1000450 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6743. CVE-2017-12597 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6744. CVE-2017-12598 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6745. CVE-2017-12599 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6746. CVE-2017-12600 libopencv-flann2.4v5 (remotely exploitable, high urgency)
  6747. CVE-2017-12601 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6748. CVE-2017-12602 libopencv-flann2.4v5 (remotely exploitable, high urgency)
  6749. CVE-2017-12603 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6750. CVE-2017-12604 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6751. CVE-2017-12605 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6752. CVE-2017-12606 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6753. CVE-2017-12862 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6754. CVE-2017-12863 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6755. CVE-2017-12864 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6756. CVE-2017-17760 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6757. CVE-2018-5268 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6758. CVE-2018-5269 libopencv-flann2.4v5 (remotely exploitable, medium urgency)
  6759. CVE-2018-7712 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  6760. CVE-2018-7713 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  6761. CVE-2018-7714 libopencv-flann2.4v5 (remotely exploitable, low urgency)
  6762. CVE-2017-12424 login (remotely exploitable, high urgency)
  6763. CVE-2018-7169 login (remotely exploitable, medium urgency)
  6764. CVE-2018-9234 gnupg-agent (remotely exploitable, low urgency)
  6765. CVE-2017-7697 libsamplerate0 (remotely exploitable, medium urgency)
  6766. CVE-2016-1516 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6767. CVE-2016-1517 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6768. CVE-2017-1000450 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6769. CVE-2017-12597 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6770. CVE-2017-12598 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6771. CVE-2017-12599 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6772. CVE-2017-12600 libopencv-video2.4v5 (remotely exploitable, high urgency)
  6773. CVE-2017-12601 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6774. CVE-2017-12602 libopencv-video2.4v5 (remotely exploitable, high urgency)
  6775. CVE-2017-12603 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6776. CVE-2017-12604 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6777. CVE-2017-12605 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6778. CVE-2017-12606 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6779. CVE-2017-12862 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6780. CVE-2017-12863 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6781. CVE-2017-12864 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6782. CVE-2017-17760 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6783. CVE-2018-5268 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6784. CVE-2018-5269 libopencv-video2.4v5 (remotely exploitable, medium urgency)
  6785. CVE-2018-7712 libopencv-video2.4v5 (remotely exploitable, low urgency)
  6786. CVE-2018-7713 libopencv-video2.4v5 (remotely exploitable, low urgency)
  6787. CVE-2018-7714 libopencv-video2.4v5 (remotely exploitable, low urgency)
  6788. CVE-2017-10268 mariadb-server-10.1 (low urgency)
  6789. CVE-2017-10378 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6790. CVE-2017-15365 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6791. CVE-2017-3636 mariadb-server-10.1 (medium urgency)
  6792. CVE-2017-3641 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6793. CVE-2017-3653 mariadb-server-10.1 (remotely exploitable, low urgency)
  6794. CVE-2018-2562 mariadb-server-10.1 (remotely exploitable, high urgency)
  6795. CVE-2018-2612 mariadb-server-10.1 (remotely exploitable, high urgency)
  6796. CVE-2018-2622 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6797. CVE-2018-2640 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6798. CVE-2018-2665 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6799. CVE-2018-2668 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6800. CVE-2018-2755 mariadb-server-10.1 (low urgency)
  6801. CVE-2018-2761 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6802. CVE-2018-2766 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6803. CVE-2018-2767 mariadb-server-10.1 (remotely exploitable, low urgency)
  6804. CVE-2018-2771 mariadb-server-10.1 (remotely exploitable, low urgency)
  6805. CVE-2018-2781 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6806. CVE-2018-2782 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6807. CVE-2018-2784 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6808. CVE-2018-2787 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6809. CVE-2018-2813 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6810. CVE-2018-2817 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6811. CVE-2018-2819 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6812. CVE-2018-3058 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6813. CVE-2018-3063 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6814. CVE-2018-3064 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6815. CVE-2018-3066 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6816. CVE-2018-3081 mariadb-server-10.1 (remotely exploitable, medium urgency)
  6817. CVE-2017-14160 libvorbis0a (remotely exploitable, medium urgency)
  6818. CVE-2018-10392 libvorbis0a (remotely exploitable, medium urgency)
  6819. CVE-2018-10393 libvorbis0a (remotely exploitable, medium urgency)
  6820. CVE-2002-2439 gcc-4.7-base (low urgency)
  6821. CVE-2014-5044 gcc-4.7-base (remotely exploitable, high urgency)
  6822. CVE-2017-11671 gcc-4.7-base (low urgency)
  6823. CVE-2002-2439 gcc-4.6-base (low urgency)
  6824. CVE-2014-5044 gcc-4.6-base (remotely exploitable, high urgency)
  6825. CVE-2017-11671 gcc-4.6-base (low urgency)
  6826. CVE-2016-9811 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  6827. CVE-2017-5837 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  6828. CVE-2017-5844 gstreamer0.10-plugins-base (remotely exploitable, medium urgency)
  6829. CVE-2018-15919 openssh-client
  6830. CVE-2018-10754 ncurses-bin (remotely exploitable, low urgency)
  6831. CVE-2018-9234 dirmngr (remotely exploitable, low urgency)
  6832. CVE-2017-10683 libmpg123-0 (remotely exploitable, medium urgency)
  6833. CVE-2017-12797 libmpg123-0 (remotely exploitable, medium urgency)
  6834. CVE-2017-9545 libmpg123-0 (remotely exploitable, low urgency)
  6835. CVE-2016-9797 bluez (remotely exploitable, medium urgency)
  6836. CVE-2016-9798 bluez (remotely exploitable, medium urgency)
  6837. CVE-2016-9799 bluez (remotely exploitable, medium urgency)
  6838. CVE-2016-9800 bluez (remotely exploitable, medium urgency)
  6839. CVE-2016-9801 bluez (remotely exploitable, medium urgency)
  6840. CVE-2016-9802 bluez (remotely exploitable, medium urgency)
  6841. CVE-2016-9803 bluez (remotely exploitable, medium urgency)
  6842. CVE-2016-9804 bluez (remotely exploitable, medium urgency)
  6843. CVE-2016-9917 bluez (remotely exploitable, medium urgency)
  6844. CVE-2016-9918 bluez (remotely exploitable, medium urgency)
  6845. CVE-2017-1000250 bluez (remotely exploitable, low urgency)
  6846. CVE-2018-10910 bluez
  6847. CVE-2018-11645 libgs9 (remotely exploitable, medium urgency)
  6848. CVE-2018-17961 libgs9
  6849. CVE-2018-18073 libgs9
  6850. CVE-2018-18284 libgs9
  6851. CVE-2017-11399 libavformat57 (remotely exploitable, medium urgency)
  6852. CVE-2017-11665 libavformat57 (remotely exploitable, medium urgency)
  6853. CVE-2017-11719 libavformat57 (remotely exploitable, medium urgency)
  6854. CVE-2017-14054 libavformat57 (remotely exploitable, high urgency)
  6855. CVE-2017-14055 libavformat57 (remotely exploitable, high urgency)
  6856. CVE-2017-14056 libavformat57 (remotely exploitable, high urgency)
  6857. CVE-2017-14057 libavformat57 (remotely exploitable, high urgency)
  6858. CVE-2017-14058 libavformat57 (remotely exploitable, medium urgency)
  6859. CVE-2017-14059 libavformat57 (remotely exploitable, high urgency)
  6860. CVE-2017-14169 libavformat57 (remotely exploitable, medium urgency)
  6861. CVE-2017-14170 libavformat57 (remotely exploitable, high urgency)
  6862. CVE-2017-14171 libavformat57 (remotely exploitable, high urgency)
  6863. CVE-2017-14222 libavformat57 (remotely exploitable, high urgency)
  6864. CVE-2017-14223 libavformat57 (remotely exploitable, high urgency)
  6865. CVE-2017-14225 libavformat57 (remotely exploitable, medium urgency)
  6866. CVE-2017-14767 libavformat57 (remotely exploitable, medium urgency)
  6867. CVE-2017-15186 libavformat57 (remotely exploitable, medium urgency)
  6868. CVE-2017-15672 libavformat57 (remotely exploitable, medium urgency)
  6869. CVE-2017-16840 libavformat57 (remotely exploitable, high urgency)
  6870. CVE-2017-17081 libavformat57 (remotely exploitable, medium urgency)
  6871. CVE-2017-9608 libavformat57 (remotely exploitable, medium urgency)
  6872. CVE-2018-10001 libavformat57 (remotely exploitable, medium urgency)
  6873. CVE-2018-12458 libavformat57 (remotely exploitable, medium urgency)
  6874. CVE-2018-12459 libavformat57 (remotely exploitable, low urgency)
  6875. CVE-2018-13300 libavformat57 (remotely exploitable, medium urgency)
  6876. CVE-2018-13301 libavformat57 (remotely exploitable, low urgency)
  6877. CVE-2018-13302 libavformat57 (remotely exploitable, medium urgency)
  6878. CVE-2018-13303 libavformat57 (remotely exploitable, medium urgency)
  6879. CVE-2018-13304 libavformat57 (remotely exploitable, medium urgency)
  6880. CVE-2018-14394 libavformat57 (remotely exploitable, medium urgency)
  6881. CVE-2018-14395 libavformat57 (remotely exploitable, medium urgency)
  6882. CVE-2018-15822 libavformat57 (low urgency)
  6883. CVE-2018-1999010 libavformat57 (remotely exploitable, high urgency)
  6884. CVE-2018-1999011 libavformat57 (remotely exploitable, medium urgency)
  6885. CVE-2018-1999012 libavformat57 (remotely exploitable, high urgency)
  6886. CVE-2018-1999013 libavformat57 (remotely exploitable, medium urgency)
  6887. CVE-2018-1999014 libavformat57 (remotely exploitable, medium urgency)
  6888. CVE-2018-1999015 libavformat57 (remotely exploitable, medium urgency)
  6889. CVE-2018-6392 libavformat57 (remotely exploitable, medium urgency)
  6890. CVE-2018-6621 libavformat57 (remotely exploitable, medium urgency)
  6891. CVE-2018-6912 libavformat57 (remotely exploitable, low urgency)
  6892. CVE-2018-7557 libavformat57 (remotely exploitable, medium urgency)
  6893. CVE-2018-7751 libavformat57 (remotely exploitable, medium urgency)
  6894. CVE-2018-9841 libavformat57 (remotely exploitable, low urgency)
  6895. CVE-2018-16428 libglib2.0-bin (low urgency)
  6896. CVE-2018-16429 libglib2.0-bin (low urgency)
  6897. CVE-2016-10228 libc6-dev (remotely exploitable, medium urgency)
  6898. CVE-2016-10517 redis-server (remotely exploitable, medium urgency)
  6899. CVE-2017-9525 cron (medium urgency)
  6900. CVE-2016-6328 libexif12
  6901. CVE-2017-7544 libexif12 (remotely exploitable, medium urgency)
  6902. CVE-2017-16612 libwayland-cursor0 (remotely exploitable, medium urgency)
  6903. CVE-2016-10228 locales (remotely exploitable, medium urgency)
  6904. CVE-2016-1516 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6905. CVE-2016-1517 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6906. CVE-2017-1000450 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6907. CVE-2017-12597 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6908. CVE-2017-12598 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6909. CVE-2017-12599 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6910. CVE-2017-12600 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
  6911. CVE-2017-12601 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6912. CVE-2017-12602 libopencv-imgproc2.4v5 (remotely exploitable, high urgency)
  6913. CVE-2017-12603 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6914. CVE-2017-12604 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6915. CVE-2017-12605 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6916. CVE-2017-12606 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6917. CVE-2017-12862 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6918. CVE-2017-12863 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6919. CVE-2017-12864 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6920. CVE-2017-17760 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6921. CVE-2018-5268 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6922. CVE-2018-5269 libopencv-imgproc2.4v5 (remotely exploitable, medium urgency)
  6923. CVE-2018-7712 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  6924. CVE-2018-7713 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  6925. CVE-2018-7714 libopencv-imgproc2.4v5 (remotely exploitable, low urgency)
  6926. CVE-2016-10040 libqt5concurrent5 (remotely exploitable, medium urgency)
  6927. CVE-2018-14598 libx11-data (low urgency)
  6928. CVE-2018-14599 libx11-data (low urgency)
  6929. CVE-2018-14600 libx11-data (low urgency)
  6930. CVE-2017-14062 libidn11 (remotely exploitable, high urgency)
  6931. CVE-2016-2568 libpolkit-gobject-1-0 (medium urgency)
  6932. CVE-2018-1116 libpolkit-gobject-1-0 (low urgency)
  6933. CVE-2016-2779 util-linux (high urgency)
  6934. CVE-2017-12678 libtag1v5-vanilla (remotely exploitable, medium urgency)
  6935. CVE-2018-11439 libtag1v5-vanilla (remotely exploitable, medium urgency)
  6936. CVE-2017-11671 gcc-5-base (low urgency)
  6937. CVE-2017-18248 libcups2 (remotely exploitable, low urgency)
  6938. CVE-2016-2779 libsmartcols1 (high urgency)
  6939. CVE-2017-9118 php7.2-opcache (remotely exploitable, medium urgency)
  6940. CVE-2017-9120 php7.2-opcache (remotely exploitable, high urgency)
  6941. CVE-2018-17082 php7.2-opcache
  6942. CVE-2017-12618 libaprutil1-ldap (low urgency)
  6943. CVE-2017-16612 libwayland-server0 (remotely exploitable, medium urgency)
  6944.  
  6945. [ letsencrypt ]
  6946. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  6947. Cert not yet due for renewal
  6948. Keeping the existing certificate
  6949.  
  6950. -------------------------------------------------------------------------------
  6951. Certificate not yet due for renewal; no action taken.
  6952. -------------------------------------------------------------------------------
  6953. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  6954. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  6955.  
  6956. [ nc-prettyURL ]
  6957. System config value htaccess.RewriteBase set to string /
  6958. .htaccess has been updated
  6959. Your cloud now has a pretty domain name.
  6960.  
  6961. [ nc-update-nextcloud ]
  6962. Current Nextcloud version 14.0.3.0
  6963. Available Nextcloud version 13.0.5
  6964. Nothing to update
  6965.  
  6966. [ nc-update-nextcloud ]
  6967. Current Nextcloud version 14.0.3.0
  6968. Available Nextcloud version 13.0.5
  6969. Nothing to update
  6970.  
  6971. [ nc-update ]
  6972. Downloading updates
  6973. Performing updates
  6974. Installing DDNS_spDYN
  6975. Installing nc-backup
  6976. Installing nc-restore
  6977. previewgenerator already installed
  6978. previewgenerator enabled
  6979. Activating nc-autoupdate-nc
  6980. [ nc-autoupdate-nc ]
  6981. automatic Nextcloud updates enabled
  6982. automatic Nextcloud updates enabled
  6983.  
  6984. System config value trusted_domains => 7 set to string nextcloudpi
  6985. System config value trusted_domains => 8 set to string nextcloudpi.lan
  6986. NextCloudPi updated to version v0.64.2
  6987.  
  6988. [ DDNS_no-ip ]
  6989.  
  6990. Auto configuration for Linux client of no-ip.com.
  6991.  
  6992. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  6993. It will be used.
  6994.  
  6995. New configuration file '/usr/local/etc/no-ip2.conf' created.
  6996.  
  6997. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  6998. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  6999. noip DDNS enabled
  7000.  
  7001. [ncp-update-nc]
  7002. Current Nextcloud version 14.0.3.0
  7003. Available Nextcloud version 14.0.3
  7004. Nothing to update
  7005.  
  7006. [ncp-update-nc]
  7007. Current Nextcloud version 14.0.3.0
  7008. Available Nextcloud version 14.0.3
  7009. Nothing to update
  7010.  
  7011. [ncp-update-nc]
  7012. Current Nextcloud version 14.0.3.0
  7013. Available Nextcloud version 14.0.3
  7014. Nothing to update
  7015.  
  7016. [ncp-update-nc]
  7017. Current Nextcloud version 14.0.3.0
  7018. Available Nextcloud version 14.0.3
  7019. Nothing to update
  7020.  
  7021. [ nc-limits ]
  7022. Using 729179136B for PHP
  7023. Using 4 PHP threads
  7024. Using 729179136B for Redis
  7025.  
  7026. [ nc-autoupdate-nc ]
  7027. automatic Nextcloud updates enabled
  7028.  
  7029. [ncp-update-nc]
  7030. Current Nextcloud version 14.0.3.0
  7031. Available Nextcloud version 14.0.3
  7032. Nothing to update
  7033.  
  7034. [ nc-limits ]
  7035. Using 729179136B for PHP
  7036. Using 4 PHP threads
  7037. Using 729179136B for Redis
  7038.  
  7039. [ncp-update-nc]
  7040. Current Nextcloud version 14.0.3.0
  7041. Available Nextcloud version 14.0.3
  7042. Nothing to update
  7043.  
  7044. [ncp-update-nc]
  7045. Current Nextcloud version 14.0.3.0
  7046. Available Nextcloud version 14.0.3
  7047. Nothing to update
  7048.  
  7049. [ nc-autoupdate-nc ]
  7050. automatic Nextcloud updates enabled
  7051.  
  7052. [ncp-update-nc]
  7053. Current Nextcloud version 14.0.3.0
  7054. Available Nextcloud version 14.0.3
  7055. Nothing to update
  7056.  
  7057. [ncp-update-nc]
  7058. Current Nextcloud version 14.0.3.0
  7059. Available Nextcloud version 14.0.3
  7060. Nothing to update
  7061.  
  7062. [ncp-update-nc]
  7063. Current Nextcloud version 14.0.3.0
  7064. Available Nextcloud version 14.0.3
  7065. Nothing to update
  7066.  
  7067. [ nc-autoupdate-nc ]
  7068. automatic Nextcloud updates enabled
  7069.  
  7070. [ncp-update-nc]
  7071. Nextcloud is in maintenance mode - no apps have been loaded
  7072.  
  7073. Current Nextcloud version 14.0.3.0
  7074. Available Nextcloud version 14.0.3
  7075. Nothing to update
  7076.  
  7077. [ncp-update-nc]
  7078. Current Nextcloud version 14.0.3.0
  7079. Available Nextcloud version 14.0.3
  7080. Nothing to update
  7081.  
  7082. [ncp-update-nc]
  7083. Current Nextcloud version 14.0.3.0
  7084. Available Nextcloud version 14.0.3
  7085. Nothing to update
  7086.  
  7087. [ nc-limits ]
  7088. Using 729179136B for PHP
  7089. Using 4 PHP threads
  7090. Using 729179136B for Redis
  7091.  
  7092. [ nc-limits ]
  7093. Using 729179136B for PHP
  7094. Using 4 PHP threads
  7095. Using 729179136B for Redis
  7096.  
  7097. [ncp-update-nc]
  7098. Nextcloud is in maintenance mode - no apps have been loaded
  7099.  
  7100. Current Nextcloud version 14.0.3.0
  7101. Available Nextcloud version 14.0.3
  7102. Nothing to update
  7103.  
  7104. [ncp-update-nc]
  7105. Current Nextcloud version 14.0.3.0
  7106. Available Nextcloud version 14.0.3
  7107. Nothing to update
  7108.  
  7109. [ncp-update-nc]
  7110. Current Nextcloud version 14.0.3.0
  7111. Available Nextcloud version 14.0.3
  7112. Nothing to update
  7113.  
  7114. [ncp-update-nc]
  7115. Current Nextcloud version 14.0.3.0
  7116. Available Nextcloud version 14.0.3
  7117. Nothing to update
  7118.  
  7119. [ nc-autoupdate-nc ]
  7120. automatic Nextcloud updates enabled
  7121.  
  7122. [ncp-update-nc]
  7123. Cannot load Zend OPcache - it was already loaded
  7124. Current Nextcloud version 14.0.3.0
  7125. Available Nextcloud version 14.0.3
  7126. Nothing to update
  7127.  
  7128. [ncp-update-nc]
  7129. Cannot load Zend OPcache - it was already loaded
  7130. Current Nextcloud version 14.0.3.0
  7131. Available Nextcloud version 14.0.3
  7132. Nothing to update
  7133.  
  7134. [ nc-limits ]
  7135. Using 729176064B for PHP
  7136. Using 4 PHP threads
  7137. Using 729176064B for Redis
  7138.  
  7139. [ncp-update-nc]
  7140. Cannot load Zend OPcache - it was already loaded
  7141. Current Nextcloud version 14.0.3.0
  7142. Available Nextcloud version 14.0.3
  7143. Nothing to update
  7144.  
  7145. [ nc-limits ]
  7146. Using 729176064B for PHP
  7147. Using 4 PHP threads
  7148. Using 729176064B for Redis
  7149.  
  7150. [ncp-update-nc]
  7151. Cannot load Zend OPcache - it was already loaded
  7152. Nextcloud is in maintenance mode - no apps have been loaded
  7153.  
  7154. Current Nextcloud version 14.0.3.0
  7155. Available Nextcloud version 14.0.3
  7156. Nothing to update
  7157.  
  7158. [ncp-update-nc]
  7159. Cannot load Zend OPcache - it was already loaded
  7160. Nextcloud is in maintenance mode - no apps have been loaded
  7161.  
  7162. Current Nextcloud version 14.0.3.0
  7163. Available Nextcloud version 14.0.3
  7164. Nothing to update
  7165.  
  7166. [ncp-update-nc]
  7167. Cannot load Zend OPcache - it was already loaded
  7168. Nextcloud is in maintenance mode - no apps have been loaded
  7169.  
  7170. Current Nextcloud version 14.0.3.0
  7171. Available Nextcloud version 14.0.3
  7172. Nothing to update
  7173.  
  7174. [ncp-update-nc]
  7175. Cannot load Zend OPcache - it was already loaded
  7176. Nextcloud is in maintenance mode - no apps have been loaded
  7177.  
  7178. Current Nextcloud version 14.0.3.0
  7179. Available Nextcloud version 14.0.3
  7180. Nothing to update
  7181.  
  7182. [ nc-update ]
  7183. Downloading updates
  7184. Performing updates
  7185. Installing DDNS_spDYN
  7186. Installing nc-backup
  7187. Installing nc-restore
  7188. Activating nc-autoupdate-nc
  7189. [ nc-autoupdate-nc ]
  7190. automatic Nextcloud updates enabled
  7191. automatic Nextcloud updates enabled
  7192.  
  7193. Cannot load Zend OPcache - it was already loaded
  7194. System config value trusted_domains => 7 set to string nextcloudpi
  7195. Cannot load Zend OPcache - it was already loaded
  7196. System config value trusted_domains => 8 set to string nextcloudpi.lan
  7197. Cannot load Zend OPcache - it was already loaded
  7198. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7199. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7200. Hit:3 https://packages.sury.org/php stretch InRelease
  7201. Reading package lists...
  7202. Reading package lists...
  7203. Building dependency tree...
  7204. Reading state information...
  7205. apt-transport-https is already the newest version (1.4.8).
  7206. gnupg is already the newest version (2.1.18-8~deb9u2).
  7207. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7208. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7209. OK
  7210. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7211. Hit:2 https://packages.sury.org/php stretch InRelease
  7212. Hit:3 http://archive.raspberrypi.org/debian stretch InRelease
  7213. Reading package lists...
  7214. Reading package lists...
  7215. Building dependency tree...
  7216. Reading state information...
  7217. curl is already the newest version (7.52.1-5+deb9u8).
  7218. debian-goodies is already the newest version (0.69.1).
  7219. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7220. Reading package lists...
  7221. Building dependency tree...
  7222. Reading state information...
  7223. rpi-update is already the newest version (20140705).
  7224. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7225. Reading package lists...
  7226. Building dependency tree...
  7227. Reading state information...
  7228. Calculating upgrade...
  7229. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7230. Reading package lists...
  7231. Building dependency tree...
  7232. Reading state information...
  7233. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7234. NextCloudPi updated to version v0.66.1
  7235.  
  7236. [ncp-update-nc]
  7237. Current Nextcloud version 14.0.3.0
  7238. Available Nextcloud version 14.0.3
  7239. Nothing to update
  7240.  
  7241. [ nc-autoupdate-nc ]
  7242. automatic Nextcloud updates enabled
  7243.  
  7244. [ncp-update-nc]
  7245. Cannot load Zend OPcache - it was already loaded
  7246. Current Nextcloud version 14.0.3.0
  7247. Available Nextcloud version 14.0.3
  7248. Nothing to update
  7249.  
  7250. [ncp-update-nc]
  7251. Cannot load Zend OPcache - it was already loaded
  7252. Current Nextcloud version 14.0.3.0
  7253. Available Nextcloud version 14.0.3
  7254. Nothing to update
  7255.  
  7256. [ nc-limits ]
  7257. Using 729176064B for PHP
  7258. Using 4 PHP threads
  7259. Using 729176064B for Redis
  7260.  
  7261. [ncp-update-nc]
  7262. Cannot load Zend OPcache - it was already loaded
  7263. Nextcloud is in maintenance mode - no apps have been loaded
  7264.  
  7265. Current Nextcloud version 14.0.3.0
  7266. Available Nextcloud version 14.0.3
  7267. Nothing to update
  7268.  
  7269. [ncp-update-nc]
  7270. Cannot load Zend OPcache - it was already loaded
  7271. Nextcloud is in maintenance mode - no apps have been loaded
  7272.  
  7273. Current Nextcloud version 14.0.3.0
  7274. Available Nextcloud version 14.0.3
  7275. Nothing to update
  7276.  
  7277. [ncp-update-nc]
  7278. Cannot load Zend OPcache - it was already loaded
  7279. Nextcloud is in maintenance mode - no apps have been loaded
  7280.  
  7281. Current Nextcloud version 14.0.3.0
  7282. Available Nextcloud version 14.0.3
  7283. Nothing to update
  7284.  
  7285. [ncp-update-nc]
  7286. Cannot load Zend OPcache - it was already loaded
  7287. Nextcloud is in maintenance mode - no apps have been loaded
  7288.  
  7289. Current Nextcloud version 14.0.3.0
  7290. Available Nextcloud version 14.0.3
  7291. Nothing to update
  7292.  
  7293. [ncp-update-nc]
  7294. Cannot load Zend OPcache - it was already loaded
  7295. Nextcloud is in maintenance mode - no apps have been loaded
  7296.  
  7297. Current Nextcloud version 14.0.3.0
  7298. Available Nextcloud version 14.0.3
  7299. Nothing to update
  7300.  
  7301. [ncp-update-nc]
  7302. Cannot load Zend OPcache - it was already loaded
  7303. Nextcloud is in maintenance mode - no apps have been loaded
  7304.  
  7305. Current Nextcloud version 14.0.3.0
  7306. Available Nextcloud version 14.0.3
  7307. Nothing to update
  7308.  
  7309. [ncp-update-nc]
  7310. Cannot load Zend OPcache - it was already loaded
  7311. Nextcloud is in maintenance mode - no apps have been loaded
  7312.  
  7313. Current Nextcloud version 14.0.3.0
  7314. Available Nextcloud version 14.0.3
  7315. Nothing to update
  7316.  
  7317. [ nc-limits ]
  7318. Using 729176064B for PHP
  7319. Using 4 PHP threads
  7320. Using 729176064B for Redis
  7321.  
  7322. [ nc-limits ]
  7323. Using 729176064B for PHP
  7324. Using 4 PHP threads
  7325. Using 729176064B for Redis
  7326.  
  7327. [ncp-update-nc]
  7328. Cannot load Zend OPcache - it was already loaded
  7329. Nextcloud is in maintenance mode - no apps have been loaded
  7330.  
  7331. Current Nextcloud version 14.0.3.0
  7332. Available Nextcloud version 14.0.3
  7333. Nothing to update
  7334.  
  7335. [ncp-update-nc]
  7336. Cannot load Zend OPcache - it was already loaded
  7337. Current Nextcloud version 14.0.3.0
  7338. Available Nextcloud version 14.0.3
  7339. Nothing to update
  7340.  
  7341. [ncp-update-nc]
  7342. Cannot load Zend OPcache - it was already loaded
  7343. Current Nextcloud version 14.0.3.0
  7344. Available Nextcloud version 14.0.3
  7345. Nothing to update
  7346.  
  7347. [ncp-update-nc]
  7348. Cannot load Zend OPcache - it was already loaded
  7349. Current Nextcloud version 14.0.3.0
  7350. Available Nextcloud version 14.0.3
  7351. Nothing to update
  7352.  
  7353. [ nc-autoupdate-nc ]
  7354. automatic Nextcloud updates enabled
  7355.  
  7356. [ncp-update-nc]
  7357. Current Nextcloud version 14.0.3.0
  7358. Available Nextcloud version 14.0.4
  7359. Download Nextcloud 14.0.4...
  7360. Back up current instance...
  7361. check free space...
  7362. Maintenance mode enabled
  7363. backup database...
  7364. backup base files...
  7365. compressing backup file...
  7366. backup /var/www//nextcloud-bkp_20181126_1543210171.tar.gz generated
  7367. Maintenance mode disabled
  7368. Install Nextcloud 14.0.4...
  7369. Restore apps...
  7370. * admin_notifications
  7371. * bookmarks
  7372. * bruteforcesettings
  7373. * calendar
  7374. * contacts
  7375. * end_to_end_encryption
  7376. * gpxpod
  7377. * notes
  7378. * previewgenerator
  7379. * ransomware_protection
  7380. * sensorlogger
  7381. * tasks
  7382. * twofactor_totp
  7383. * unsplash
  7384. Fix permissions...
  7385. Upgrade...
  7386. Nextcloud or one of the apps require upgrade - only a limited number of commands are available
  7387. You may use your browser or the occ upgrade command to do the upgrade
  7388. Set log level to debug
  7389. Turned on maintenance mode
  7390. Updating database schema
  7391. Updated database
  7392. Checking for update of app accessibility in appstore
  7393. Checked for update of app "accessibility" in appstore
  7394. Checking for update of app activity in appstore
  7395. Checked for update of app "activity" in appstore
  7396. Checking for update of app bookmarks in appstore
  7397. Update app bookmarks from appstore
  7398. Checked for update of app "bookmarks" in appstore
  7399. Checking for update of app bruteforcesettings in appstore
  7400. Update app bruteforcesettings from appstore
  7401. Checked for update of app "bruteforcesettings" in appstore
  7402. Checking for update of app calendar in appstore
  7403. Update app calendar from appstore
  7404. Checked for update of app "calendar" in appstore
  7405. Checking for update of app cloud_federation_api in appstore
  7406. Checked for update of app "cloud_federation_api" in appstore
  7407. Checking for update of app contacts in appstore
  7408. Update app contacts from appstore
  7409. Checked for update of app "contacts" in appstore
  7410. Checking for update of app dav in appstore
  7411. Checked for update of app "dav" in appstore
  7412. Checking for update of app federatedfilesharing in appstore
  7413. Checked for update of app "federatedfilesharing" in appstore
  7414. Checking for update of app files in appstore
  7415. Checked for update of app "files" in appstore
  7416. Checking for update of app files_pdfviewer in appstore
  7417. Checked for update of app "files_pdfviewer" in appstore
  7418. Checking for update of app files_sharing in appstore
  7419. Checked for update of app "files_sharing" in appstore
  7420. Checking for update of app files_texteditor in appstore
  7421. Checked for update of app "files_texteditor" in appstore
  7422. Checking for update of app files_trashbin in appstore
  7423. Checked for update of app "files_trashbin" in appstore
  7424. Checking for update of app files_versions in appstore
  7425. Checked for update of app "files_versions" in appstore
  7426. Checking for update of app files_videoplayer in appstore
  7427. Checked for update of app "files_videoplayer" in appstore
  7428. Checking for update of app firstrunwizard in appstore
  7429. Checked for update of app "firstrunwizard" in appstore
  7430. Checking for update of app gallery in appstore
  7431. Checked for update of app "gallery" in appstore
  7432. Checking for update of app logreader in appstore
  7433. Checked for update of app "logreader" in appstore
  7434. Checking for update of app lookup_server_connector in appstore
  7435. Checked for update of app "lookup_server_connector" in appstore
  7436. Checking for update of app nextcloud_announcements in appstore
  7437. Checked for update of app "nextcloud_announcements" in appstore
  7438. Checking for update of app notes in appstore
  7439. Update app notes from appstore
  7440. Checked for update of app "notes" in appstore
  7441. Checking for update of app notifications in appstore
  7442. Checked for update of app "notifications" in appstore
  7443. Checking for update of app oauth2 in appstore
  7444. Checked for update of app "oauth2" in appstore
  7445. Checking for update of app password_policy in appstore
  7446. Checked for update of app "password_policy" in appstore
  7447. Checking for update of app previewgenerator in appstore
  7448. Checked for update of app "previewgenerator" in appstore
  7449. Checking for update of app provisioning_api in appstore
  7450. Checked for update of app "provisioning_api" in appstore
  7451. Checking for update of app sensorlogger in appstore
  7452. Checked for update of app "sensorlogger" in appstore
  7453. Checking for update of app serverinfo in appstore
  7454. Checked for update of app "serverinfo" in appstore
  7455. Checking for update of app sharebymail in appstore
  7456. Checked for update of app "sharebymail" in appstore
  7457. Checking for update of app support in appstore
  7458. Checked for update of app "support" in appstore
  7459. Checking for update of app tasks in appstore
  7460. Update app tasks from appstore
  7461. Checked for update of app "tasks" in appstore
  7462. Checking for update of app theming in appstore
  7463. Checked for update of app "theming" in appstore
  7464. Checking for update of app twofactor_backupcodes in appstore
  7465. Checked for update of app "twofactor_backupcodes" in appstore
  7466. Checking for update of app unsplash in appstore
  7467. Checked for update of app "unsplash" in appstore
  7468. Checking for update of app updatenotification in appstore
  7469. Checked for update of app "updatenotification" in appstore
  7470. Checking for update of app workflowengine in appstore
  7471. Checked for update of app "workflowengine" in appstore
  7472. Starting code integrity check...
  7473. Finished code integrity check
  7474. Update successful
  7475. Turned off maintenance mode
  7476. Reset log level
  7477. Check indices of the share table.
  7478. Done.
  7479. Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181126_1543210171-14.0.3.0.tar.gz
  7480. Clean up...
  7481.  
  7482. [ncp-update-nc]
  7483. Current Nextcloud version 14.0.4.2
  7484. Available Nextcloud version 14.0.4
  7485. Nothing to update
  7486.  
  7487. [ nc-limits ]
  7488. Using 729176064B for PHP
  7489. Using 4 PHP threads
  7490. Using 729176064B for Redis
  7491.  
  7492. [ nc-autoupdate-nc ]
  7493. automatic Nextcloud updates enabled
  7494.  
  7495. [ncp-update-nc]
  7496. Current Nextcloud version 14.0.4.2
  7497. Available Nextcloud version 14.0.4
  7498. Nothing to update
  7499.  
  7500. [ nc-limits ]
  7501. Using 729176064B for PHP
  7502. Using 4 PHP threads
  7503. Using 729176064B for Redis
  7504.  
  7505. [ nc-limits ]
  7506. Using 729176064B for PHP
  7507. Using 4 PHP threads
  7508. Using 729176064B for Redis
  7509.  
  7510. [ nc-limits ]
  7511. Using 729176064B for PHP
  7512. Using 4 PHP threads
  7513. Using 729176064B for Redis
  7514.  
  7515. [ncp-update-nc]
  7516. Nextcloud is in maintenance mode - no apps have been loaded
  7517.  
  7518. Current Nextcloud version 14.0.4.2
  7519. Available Nextcloud version 14.0.4
  7520. Nothing to update
  7521.  
  7522. [ nc-update ]
  7523. Downloading updates
  7524. Performing updates
  7525. Installing DDNS_spDYN
  7526. Installing nc-backup
  7527. Installing nc-restore
  7528. System config value trusted_domains => 7 set to string nextcloudpi
  7529. System config value trusted_domains => 8 set to string nextcloudpi.lan
  7530. Get:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease [15.0 kB]
  7531. Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
  7532. Hit:3 https://packages.sury.org/php stretch InRelease
  7533. Get:4 http://raspbian.raspberrypi.org/raspbian stretch/main armhf Packages [11.7 MB]
  7534. Fetched 11.7 MB in 10s (1093 kB/s)
  7535. Reading package lists...
  7536. Reading package lists...
  7537. Building dependency tree...
  7538. Reading state information...
  7539. apt-transport-https is already the newest version (1.4.8).
  7540. gnupg is already the newest version (2.1.18-8~deb9u3).
  7541. 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
  7542. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7543. OK
  7544. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7545. Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
  7546. Hit:3 https://packages.sury.org/php stretch InRelease
  7547. Reading package lists...
  7548. Reading package lists...
  7549. Building dependency tree...
  7550. Reading state information...
  7551. curl is already the newest version (7.52.1-5+deb9u8).
  7552. debian-goodies is already the newest version (0.69.1).
  7553. 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
  7554. Reading package lists...
  7555. Building dependency tree...
  7556. Reading state information...
  7557. rpi-update is already the newest version (20140705).
  7558. 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
  7559. Reading package lists...
  7560. Building dependency tree...
  7561. Reading state information...
  7562. Calculating upgrade...
  7563. The following packages will be upgraded:
  7564. libgs9 libgs9-common
  7565. 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7566. Need to get 7003 kB of archives.
  7567. After this operation, 28.7 kB of additional disk space will be used.
  7568. Get:1 http://ftp.gwdg.de/pub/linux/debian/raspbian/raspbian stretch/main armhf libgs9 armhf 9.26~dfsg-0+deb9u1 [1863 kB]
  7569. Get:2 http://ftp.gwdg.de/pub/linux/debian/raspbian/raspbian stretch/main armhf libgs9-common all 9.26~dfsg-0+deb9u1 [5140 kB]
  7570. apt-listchanges: Reading changelogs...
  7571. Fetched 7003 kB in 2s (2633 kB/s)
  7572. (Reading database ...
  7573. (Reading database ... 5%
  7574. (Reading database ... 10%
  7575. (Reading database ... 15%
  7576. (Reading database ... 20%
  7577. (Reading database ... 25%
  7578. (Reading database ... 30%
  7579. (Reading database ... 35%
  7580. (Reading database ... 40%
  7581. (Reading database ... 45%
  7582. (Reading database ... 50%
  7583. (Reading database ... 55%
  7584. (Reading database ... 60%
  7585. (Reading database ... 65%
  7586. (Reading database ... 70%
  7587. (Reading database ... 75%
  7588. (Reading database ... 80%
  7589. (Reading database ... 85%
  7590. (Reading database ... 90%
  7591. (Reading database ... 95%
  7592. (Reading database ... 100%
  7593. (Reading database ... 87081 files and directories currently installed.)
  7594. Preparing to unpack .../libgs9_9.26~dfsg-0+deb9u1_armhf.deb ...
  7595. Unpacking libgs9:armhf (9.26~dfsg-0+deb9u1) over (9.25~dfsg-0+deb9u1) ...
  7596. Preparing to unpack .../libgs9-common_9.26~dfsg-0+deb9u1_all.deb ...
  7597. Unpacking libgs9-common (9.26~dfsg-0+deb9u1) over (9.25~dfsg-0+deb9u1) ...
  7598. Setting up libgs9-common (9.26~dfsg-0+deb9u1) ...
  7599. Processing triggers for libc-bin (2.27-6) ...
  7600. Setting up libgs9:armhf (9.26~dfsg-0+deb9u1) ...
  7601. Processing triggers for libc-bin (2.27-6) ...
  7602. Reading package lists...
  7603. Building dependency tree...
  7604. Reading state information...
  7605. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7606. Reading package lists...
  7607. Building dependency tree...
  7608. Reading state information...
  7609. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  7610. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  7611. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  7612. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7613. Activating nc-autoupdate-nc
  7614. [ nc-autoupdate-nc ]
  7615. automatic Nextcloud updates enabled
  7616. automatic Nextcloud updates enabled
  7617.  
  7618. NextCloudPi updated to version v0.67.2
  7619.  
  7620. [ nc-update-nextcloud ]
  7621. Current Nextcloud version 14.0.4.2
  7622. Available Nextcloud version 13.0.5
  7623. Nothing to update
  7624.  
  7625. [ nc-update ]
  7626. Downloading updates
  7627. Performing updates
  7628. Installing DDNS_spDYN
  7629. Installing nc-backup
  7630. Installing nc-restore
  7631. System config value trusted_domains => 7 set to string nextcloudpi
  7632. System config value trusted_domains => 8 set to string nextcloudpi.lan
  7633. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7634. Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
  7635. Hit:3 https://packages.sury.org/php stretch InRelease
  7636. Reading package lists...
  7637. Reading package lists...
  7638. Building dependency tree...
  7639. Reading state information...
  7640. apt-transport-https is already the newest version (1.4.8).
  7641. gnupg is already the newest version (2.1.18-8~deb9u3).
  7642. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7643. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7644. OK
  7645. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7646. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7647. Hit:3 https://packages.sury.org/php stretch InRelease
  7648. Reading package lists...
  7649. Reading package lists...
  7650. Building dependency tree...
  7651. Reading state information...
  7652. curl is already the newest version (7.52.1-5+deb9u8).
  7653. debian-goodies is already the newest version (0.69.1).
  7654. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7655. Reading package lists...
  7656. Building dependency tree...
  7657. Reading state information...
  7658. rpi-update is already the newest version (20140705).
  7659. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7660. Reading package lists...
  7661. Building dependency tree...
  7662. Reading state information...
  7663. Calculating upgrade...
  7664. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7665. Reading package lists...
  7666. Building dependency tree...
  7667. Reading state information...
  7668. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7669. Reading package lists...
  7670. Building dependency tree...
  7671. Reading state information...
  7672. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  7673. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  7674. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  7675. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7676. Activating nc-autoupdate-nc
  7677. [ nc-autoupdate-nc ]
  7678. automatic Nextcloud updates enabled
  7679. automatic Nextcloud updates enabled
  7680.  
  7681. NextCloudPi updated to version v0.67.2
  7682.  
  7683. [ nc-update-nextcloud ]
  7684. Current Nextcloud version 14.0.4.2
  7685. Available Nextcloud version 13.0.5
  7686. Nothing to update
  7687.  
  7688. [ nc-backup ]
  7689. check free space...
  7690. clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181115_1542247201.tar
  7691. Maintenance mode enabled
  7692. backup database...
  7693. backup base files...
  7694. backup data files...
  7695. [ nc-limits ]
  7696. Using 729176064B for PHP
  7697. Using 4 PHP threads
  7698. Using 729176064B for Redis
  7699.  
  7700. [ nc-update-nextcloud ]
  7701. Current Nextcloud version 14.0.4.2
  7702. Available Nextcloud version 13.0.5
  7703. Nothing to update
  7704.  
  7705. [ nc-nextcloud ]
  7706. Downloading Nextcloud 13.0.5...
  7707. Installing Nextcloud 13.0.5...
  7708. Creating possible missing Directories
  7709. chmod Files and Directories
  7710. chown Directories
  7711. chmod/chown .htaccess
  7712. Setting up database...
  7713. Setting up Apache...
  7714. Site nextcloud already enabled
  7715. Setting up system...
  7716. Don't forget to run nc-init
  7717.  
  7718. [ nc-update-nextcloud ]
  7719. grep: nextcloud/config/config.php: No such file or directory
  7720. Nextcloud data directory not found
  7721.  
  7722. [ nc-update-nextcloud ]
  7723. grep: nextcloud/config/config.php: No such file or directory
  7724. Nextcloud data directory not found
  7725.  
  7726. [ nc-update ]
  7727. Downloading updates
  7728. Performing updates
  7729. Installing DDNS_spDYN
  7730. Installing nc-backup
  7731. Installing nc-restore
  7732. Nextcloud is not installed - only a limited number of commands are available
  7733.  
  7734.  
  7735. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7736. There are no commands defined in the "config:system" namespace.
  7737.  
  7738.  
  7739. Nextcloud is not installed - only a limited number of commands are available
  7740.  
  7741.  
  7742. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7743. There are no commands defined in the "config:system" namespace.
  7744.  
  7745.  
  7746.  
  7747.  
  7748. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7749. There are no commands defined in the "config:system" namespace.
  7750.  
  7751.  
  7752. Nextcloud is not installed - only a limited number of commands are available
  7753.  
  7754.  
  7755. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7756. There are no commands defined in the "config:system" namespace.
  7757.  
  7758.  
  7759. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7760. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7761. Hit:3 https://packages.sury.org/php stretch InRelease
  7762. Reading package lists...
  7763. Reading package lists...
  7764. Building dependency tree...
  7765. Reading state information...
  7766. apt-transport-https is already the newest version (1.4.8).
  7767. gnupg is already the newest version (2.1.18-8~deb9u3).
  7768. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7769. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7770. OK
  7771. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7772. Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
  7773. Hit:3 https://packages.sury.org/php stretch InRelease
  7774. Reading package lists...
  7775. Reading package lists...
  7776. Building dependency tree...
  7777. Reading state information...
  7778. curl is already the newest version (7.52.1-5+deb9u8).
  7779. debian-goodies is already the newest version (0.69.1).
  7780. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7781. Reading package lists...
  7782. Building dependency tree...
  7783. Reading state information...
  7784. rpi-update is already the newest version (20140705).
  7785. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7786. Reading package lists...
  7787. Building dependency tree...
  7788. Reading state information...
  7789. Calculating upgrade...
  7790. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7791. Reading package lists...
  7792. Building dependency tree...
  7793. Reading state information...
  7794. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7795. Reading package lists...
  7796. Building dependency tree...
  7797. Reading state information...
  7798. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  7799. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  7800. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  7801. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7802. Activating nc-autoupdate-nc
  7803. [ nc-autoupdate-nc ]
  7804. automatic Nextcloud updates enabled
  7805. automatic Nextcloud updates enabled
  7806.  
  7807. NextCloudPi updated to version v0.67.2
  7808.  
  7809. [ nc-limits ]
  7810. Using 729176064B for PHP
  7811. Using 4 PHP threads
  7812. Using 729176064B for Redis
  7813.  
  7814. [ nc-update ]
  7815. Downloading updates
  7816. Performing updates
  7817. Installing DDNS_spDYN
  7818. Installing nc-backup
  7819. Installing nc-restore
  7820. Nextcloud is not installed - only a limited number of commands are available
  7821.  
  7822.  
  7823. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7824. There are no commands defined in the "config:system" namespace.
  7825.  
  7826.  
  7827. Nextcloud is not installed - only a limited number of commands are available
  7828.  
  7829.  
  7830. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7831. There are no commands defined in the "config:system" namespace.
  7832.  
  7833.  
  7834.  
  7835.  
  7836. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7837. There are no commands defined in the "config:system" namespace.
  7838.  
  7839.  
  7840. Nextcloud is not installed - only a limited number of commands are available
  7841.  
  7842.  
  7843. [Symfony\Component\Console\Exception\CommandNotFoundException]
  7844. There are no commands defined in the "config:system" namespace.
  7845.  
  7846.  
  7847. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7848. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7849. Hit:3 https://packages.sury.org/php stretch InRelease
  7850. Reading package lists...
  7851. Reading package lists...
  7852. Building dependency tree...
  7853. Reading state information...
  7854. apt-transport-https is already the newest version (1.4.8).
  7855. gnupg is already the newest version (2.1.18-8~deb9u3).
  7856. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7857. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7858. OK
  7859. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7860. Hit:2 http://archive.raspberrypi.org/debian stretch InRelease
  7861. Hit:3 https://packages.sury.org/php stretch InRelease
  7862. Reading package lists...
  7863. Reading package lists...
  7864. Building dependency tree...
  7865. Reading state information...
  7866. curl is already the newest version (7.52.1-5+deb9u8).
  7867. debian-goodies is already the newest version (0.69.1).
  7868. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7869. Reading package lists...
  7870. Building dependency tree...
  7871. Reading state information...
  7872. rpi-update is already the newest version (20140705).
  7873. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7874. Reading package lists...
  7875. Building dependency tree...
  7876. Reading state information...
  7877. Calculating upgrade...
  7878. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7879. Reading package lists...
  7880. Building dependency tree...
  7881. Reading state information...
  7882. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7883. Reading package lists...
  7884. Building dependency tree...
  7885. Reading state information...
  7886. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  7887. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  7888. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  7889. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7890. Activating nc-autoupdate-nc
  7891. [ nc-autoupdate-nc ]
  7892. automatic Nextcloud updates enabled
  7893. automatic Nextcloud updates enabled
  7894.  
  7895. NextCloudPi updated to version v0.67.2
  7896.  
  7897. [ nc-update-nextcloud ]
  7898. Nextcloud data directory not found
  7899.  
  7900. [ nc-init ]
  7901. Setting up a clean Nextcloud instance... wait until message 'NC init done'
  7902. Setting up database...
  7903. Setting up Nextcloud...
  7904. Nextcloud is not installed - only a limited number of commands are available
  7905. Nextcloud was successfully installed
  7906. Set mode for background jobs to 'cron'
  7907. System config value mysql.utf8mb4 set to boolean true
  7908. System config value trusted_domains => 1 set to string 192.168.0.3
  7909. System config value trusted_domains => 5 set to string nextcloudpi.local
  7910. System config value trusted_domains => 7 set to string nextcloudpi
  7911. System config value trusted_domains => 8 set to string nextcloudpi.lan
  7912. System config value mail_smtpmode set to string sendmail
  7913. System config value mail_smtpauthtype set to string LOGIN
  7914. System config value mail_from_address set to string admin
  7915. System config value mail_domain set to string ownyourbits.com
  7916. calendar installed
  7917. contacts installed
  7918. notes installed
  7919. tasks installed
  7920. news installed
  7921. admin_notifications installed
  7922. previewgenerator installed
  7923. calendar enabled
  7924. contacts enabled
  7925. notes enabled
  7926. tasks enabled
  7927. news enabled
  7928. admin_notifications enabled
  7929. previewgenerator enabled
  7930. System config value overwriteprotocol set to string https
  7931. NC init done
  7932.  
  7933. [ nc-update-nextcloud ]
  7934. Current Nextcloud version 13.0.5.2
  7935. Available Nextcloud version 13.0.5
  7936. Nothing to update
  7937.  
  7938. [ nc-update ]
  7939. Downloading updates
  7940. Performing updates
  7941. Installing DDNS_spDYN
  7942. Installing nc-backup
  7943. Installing nc-restore
  7944. System config value trusted_domains => 7 set to string nextcloudpi
  7945. System config value trusted_domains => 8 set to string nextcloudpi.lan
  7946. System config value overwrite.cli.url set to string http://localhost/
  7947. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7948. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7949. Hit:3 https://packages.sury.org/php stretch InRelease
  7950. Reading package lists...
  7951. Reading package lists...
  7952. Building dependency tree...
  7953. Reading state information...
  7954. apt-transport-https is already the newest version (1.4.8).
  7955. gnupg is already the newest version (2.1.18-8~deb9u3).
  7956. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7957. Warning: apt-key output should not be parsed (stdout is not a terminal)
  7958. OK
  7959. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  7960. Hit:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  7961. Hit:3 https://packages.sury.org/php stretch InRelease
  7962. Reading package lists...
  7963. Reading package lists...
  7964. Building dependency tree...
  7965. Reading state information...
  7966. curl is already the newest version (7.52.1-5+deb9u8).
  7967. debian-goodies is already the newest version (0.69.1).
  7968. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7969. Reading package lists...
  7970. Building dependency tree...
  7971. Reading state information...
  7972. rpi-update is already the newest version (20140705).
  7973. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7974. Reading package lists...
  7975. Building dependency tree...
  7976. Reading state information...
  7977. Calculating upgrade...
  7978. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7979. Reading package lists...
  7980. Building dependency tree...
  7981. Reading state information...
  7982. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7983. Reading package lists...
  7984. Building dependency tree...
  7985. Reading state information...
  7986. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  7987. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  7988. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  7989. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  7990. Activating nc-autoupdate-nc
  7991. [ nc-autoupdate-nc ]
  7992. automatic Nextcloud updates enabled
  7993. automatic Nextcloud updates enabled
  7994.  
  7995. NextCloudPi updated to version v0.67.2
  7996.  
  7997. [ nc-restore ]
  7998. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  7999. tar: Unexpected EOF in archive
  8000. tar: Unexpected EOF in archive
  8001. tar: Error is not recoverable: exiting now
  8002. Cleanup...
  8003.  
  8004. [ nc-restore ]
  8005. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543519341.tar...
  8006. tar: Unexpected EOF in archive
  8007. tar: Unexpected EOF in archive
  8008. tar: Error is not recoverable: exiting now
  8009. Cleanup...
  8010.  
  8011. [ nc-restore ]
  8012. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  8013. tar: Unexpected EOF in archive
  8014. tar: Unexpected EOF in archive
  8015. tar: Error is not recoverable: exiting now
  8016. Cleanup...
  8017.  
  8018. [ nc-restore ]
  8019. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  8020. tar: Unexpected EOF in archive
  8021. tar: Unexpected EOF in archive
  8022. tar: Error is not recoverable: exiting now
  8023. Cleanup...
  8024.  
  8025. [ nc-restore ]
  8026. /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891_2.tar not found
  8027.  
  8028. [ nc-restore ]
  8029. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  8030. [ nc-limits ]
  8031. Using 729176064B for PHP
  8032. Using 4 PHP threads
  8033. Using 729176064B for Redis
  8034.  
  8035. [ncp-update-nc]
  8036. Nextcloud is in maintenance mode - no apps have been loaded
  8037.  
  8038. Current Nextcloud version 13.0.5.2
  8039. Available Nextcloud version 14.0.4
  8040. Download Nextcloud 14.0.4...
  8041. Back up current instance...
  8042. Nextcloud is in maintenance mode - no apps have been loaded
  8043.  
  8044. check free space...
  8045. Nextcloud is in maintenance mode - no apps have been loaded
  8046.  
  8047. Maintenance mode enabled
  8048. backup database...
  8049. backup base files...
  8050. compressing backup file...
  8051. backup /var/www//nextcloud-bkp_20181130_1543555524.tar.gz generated
  8052. Nextcloud is in maintenance mode - no apps have been loaded
  8053.  
  8054. Maintenance mode disabled
  8055. Install Nextcloud 14.0.4...
  8056. Restore apps...
  8057. * admin_notifications
  8058. * calendar
  8059. * contacts
  8060. * news
  8061. * notes
  8062. * previewgenerator
  8063. * tasks
  8064. Restore data...
  8065. Fix permissions...
  8066. Upgrade...
  8067. Nextcloud or one of the apps require upgrade - only a limited number of commands are available
  8068. You may use your browser or the occ upgrade command to do the upgrade
  8069. Set log level to debug
  8070. Turned on maintenance mode
  8071. Updating database schema
  8072. Updated database
  8073. Disabled incompatible app: admin_notifications
  8074. Updating <federatedfilesharing> ...
  8075. Updated <federatedfilesharing> to 1.4.0
  8076. Updating <files_texteditor> ...
  8077. Updated <files_texteditor> to 2.6.0
  8078. Updating <files_videoplayer> ...
  8079. Updated <files_videoplayer> to 1.3.0
  8080. Updating <gallery> ...
  8081. Updated <gallery> to 18.1.0
  8082. Updating <password_policy> ...
  8083. Updated <password_policy> to 1.4.0
  8084. Updating <provisioning_api> ...
  8085. Updated <provisioning_api> to 1.4.0
  8086. Updating <serverinfo> ...
  8087. Updated <serverinfo> to 1.4.0
  8088. Updating <survey_client> ...
  8089. Updated <survey_client> to 1.2.0
  8090. Updating <twofactor_backupcodes> ...
  8091. Updated <twofactor_backupcodes> to 1.3.1
  8092. Updating <updatenotification> ...
  8093. Updated <updatenotification> to 1.4.1
  8094. Updating <federation> ...
  8095. Updated <federation> to 1.4.0
  8096. Updating <lookup_server_connector> ...
  8097. Updated <lookup_server_connector> to 1.2.0
  8098. Updating <oauth2> ...
  8099. Updated <oauth2> to 1.2.1
  8100. Updating <files> ...
  8101. Updated <files> to 1.9.0
  8102. Updating <activity> ...
  8103. Updated <activity> to 2.7.0
  8104. Updating <dav> ...
  8105. Fix broken values of calendar objects
  8106.  
  8107. Starting ...
  8108. 0/0 [>---------------------------] 0%
  8109. Updated <dav> to 1.6.0
  8110. Updating <files_sharing> ...
  8111. Updated <files_sharing> to 1.6.2
  8112. Updating <files_trashbin> ...
  8113. Updated <files_trashbin> to 1.4.1
  8114. Updating <files_versions> ...
  8115. Updated <files_versions> to 1.7.1
  8116. Updating <sharebymail> ...
  8117. Updated <sharebymail> to 1.4.0
  8118. Updating <workflowengine> ...
  8119. Updated <workflowengine> to 1.4.0
  8120. Updating <comments> ...
  8121. Updated <comments> to 1.4.0
  8122. Updating <firstrunwizard> ...
  8123. Updated <firstrunwizard> to 2.3.0
  8124. Updating <nextcloud_announcements> ...
  8125. Updated <nextcloud_announcements> to 1.3.0
  8126. Updating <notifications> ...
  8127. Updated <notifications> to 2.2.1
  8128. Updating <systemtags> ...
  8129. Updated <systemtags> to 1.4.0
  8130. Updating <theming> ...
  8131. Updated <theming> to 1.5.0
  8132. Checking for update of app activity in appstore
  8133. Checked for update of app "activity" in appstore
  8134. Checking for update of app calendar in appstore
  8135. Update app calendar from appstore
  8136. Checked for update of app "calendar" in appstore
  8137. Checking for update of app cloud_federation_api in appstore
  8138. Checked for update of app "cloud_federation_api" in appstore
  8139. Checking for update of app comments in appstore
  8140. Checked for update of app "comments" in appstore
  8141. Checking for update of app contacts in appstore
  8142. Update app contacts from appstore
  8143. Checked for update of app "contacts" in appstore
  8144. Checking for update of app dav in appstore
  8145. Checked for update of app "dav" in appstore
  8146. Checking for update of app federatedfilesharing in appstore
  8147. Checked for update of app "federatedfilesharing" in appstore
  8148. Checking for update of app federation in appstore
  8149. Checked for update of app "federation" in appstore
  8150. Checking for update of app files in appstore
  8151. Checked for update of app "files" in appstore
  8152. Checking for update of app files_sharing in appstore
  8153. Checked for update of app "files_sharing" in appstore
  8154. Checking for update of app files_texteditor in appstore
  8155. Checked for update of app "files_texteditor" in appstore
  8156. Checking for update of app files_trashbin in appstore
  8157. Checked for update of app "files_trashbin" in appstore
  8158. Checking for update of app files_versions in appstore
  8159. Checked for update of app "files_versions" in appstore
  8160. Checking for update of app files_videoplayer in appstore
  8161. Checked for update of app "files_videoplayer" in appstore
  8162. Checking for update of app firstrunwizard in appstore
  8163. Checked for update of app "firstrunwizard" in appstore
  8164. Checking for update of app gallery in appstore
  8165. Checked for update of app "gallery" in appstore
  8166. Checking for update of app logreader in appstore
  8167. Checked for update of app "logreader" in appstore
  8168. Checking for update of app lookup_server_connector in appstore
  8169. Checked for update of app "lookup_server_connector" in appstore
  8170. Checking for update of app news in appstore
  8171. Update app news from appstore
  8172. Checked for update of app "news" in appstore
  8173. Checking for update of app nextcloud_announcements in appstore
  8174. Checked for update of app "nextcloud_announcements" in appstore
  8175. Checking for update of app notes in appstore
  8176. Checked for update of app "notes" in appstore
  8177. Checking for update of app notifications in appstore
  8178. Checked for update of app "notifications" in appstore
  8179. Checking for update of app oauth2 in appstore
  8180. Checked for update of app "oauth2" in appstore
  8181. Checking for update of app password_policy in appstore
  8182. Checked for update of app "password_policy" in appstore
  8183. Checking for update of app previewgenerator in appstore
  8184. Update app previewgenerator from appstore
  8185. Checked for update of app "previewgenerator" in appstore
  8186. Checking for update of app provisioning_api in appstore
  8187. Checked for update of app "provisioning_api" in appstore
  8188. Checking for update of app serverinfo in appstore
  8189. Checked for update of app "serverinfo" in appstore
  8190. Checking for update of app sharebymail in appstore
  8191. Checked for update of app "sharebymail" in appstore
  8192. Checking for update of app survey_client in appstore
  8193. Checked for update of app "survey_client" in appstore
  8194. Checking for update of app systemtags in appstore
  8195. Checked for update of app "systemtags" in appstore
  8196. Checking for update of app tasks in appstore
  8197. Checked for update of app "tasks" in appstore
  8198. Checking for update of app theming in appstore
  8199. Checked for update of app "theming" in appstore
  8200. Checking for update of app twofactor_backupcodes in appstore
  8201. Checked for update of app "twofactor_backupcodes" in appstore
  8202. Checking for update of app updatenotification in appstore
  8203. Checked for update of app "updatenotification" in appstore
  8204. Checking for update of app workflowengine in appstore
  8205. Checked for update of app "workflowengine" in appstore
  8206. Starting code integrity check...
  8207. Finished code integrity check
  8208. Update successful
  8209. Turned off maintenance mode
  8210. Reset log level
  8211. Check indices of the share table.
  8212. Adding additional mtime index to the filecache table, this can take some time...
  8213. Filecache table updated successfully.
  8214. Backup stored at /var/www/nextcloud/data/ncp-update-backups/nextcloud-bkp_20181130_1543555524-13.0.5.2.tar.gz
  8215. Clean up...
  8216.  
  8217. [ nc-limits ]
  8218. Using 729176064B for PHP
  8219. Using 4 PHP threads
  8220. Using 729176064B for Redis
  8221.  
  8222. [ nc-limits ]
  8223. Using 729176064B for PHP
  8224. Using 4 PHP threads
  8225. Using 729176064B for Redis
  8226.  
  8227. [ncp-update-nc]
  8228. Nextcloud is in maintenance mode - no apps have been loaded
  8229.  
  8230. Current Nextcloud version 14.0.4.2
  8231. Available Nextcloud version 14.0.4
  8232. Nothing to update
  8233.  
  8234. [ DDNS_no-ip ]
  8235.  
  8236. Auto configuration for Linux client of no-ip.com.
  8237.  
  8238. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  8239. It will be used.
  8240.  
  8241. New configuration file '/usr/local/etc/no-ip2.conf' created.
  8242.  
  8243. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  8244. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  8245. noip DDNS enabled
  8246.  
  8247. [ letsencrypt ]
  8248. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  8249. Cert not yet due for renewal
  8250. Keeping the existing certificate
  8251.  
  8252. -------------------------------------------------------------------------------
  8253. Certificate not yet due for renewal; no action taken.
  8254. -------------------------------------------------------------------------------
  8255. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  8256. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  8257.  
  8258. [ nc-autoupdate-nc ]
  8259. automatic Nextcloud updates enabled
  8260.  
  8261. [ nc-autoupdate-ncp ]
  8262. automatic NextCloudPi updates enabled
  8263.  
  8264. [ nc-hdd-monitor ]
  8265.  
  8266. /dev/sda: Unknown USB bridge [0x1058:0x259c (0x1005)]
  8267. Please specify device type with the -d option.
  8268.  
  8269. Use smartctl -h to get a usage summary
  8270.  
  8271. Created symlink /etc/systemd/system/multi-user.target.wants/smartd.service → /lib/systemd/system/smartd.service.
  8272. HDD monitor enabled
  8273.  
  8274. [ nc-httpsonly ]
  8275. Forcing HTTPS On
  8276.  
  8277. [ nc-restore ]
  8278. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  8279. tar: Unexpected EOF in archive
  8280. tar: Unexpected EOF in archive
  8281. tar: Error is not recoverable: exiting now
  8282. Cleanup...
  8283.  
  8284. [ nc-update ]
  8285. Downloading updates
  8286. Performing updates
  8287. Installing DDNS_spDYN
  8288. Installing nc-backup
  8289. Installing nc-restore
  8290. Nextcloud is in maintenance mode - no apps have been loaded
  8291.  
  8292. System config value trusted_domains => 7 set to string nextcloudpi
  8293. Nextcloud is in maintenance mode - no apps have been loaded
  8294.  
  8295. System config value trusted_domains => 8 set to string nextcloudpi.lan
  8296. Nextcloud is in maintenance mode - no apps have been loaded
  8297.  
  8298. Hit:1 http://archive.raspberrypi.org/debian stretch InRelease
  8299. Get:2 http://raspbian.raspberrypi.org/raspbian stretch InRelease [15.0 kB]
  8300. Hit:3 https://packages.sury.org/php stretch InRelease
  8301. Fetched 15.0 kB in 1s (10.1 kB/s)
  8302. Reading package lists...
  8303. Reading package lists...
  8304. Building dependency tree...
  8305. Reading state information...
  8306. apt-transport-https is already the newest version (1.4.8).
  8307. gnupg is already the newest version (2.1.18-8~deb9u3).
  8308. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8309. Warning: apt-key output should not be parsed (stdout is not a terminal)
  8310. OK
  8311. Hit:1 http://raspbian.raspberrypi.org/raspbian stretch InRelease
  8312. Hit:2 https://packages.sury.org/php stretch InRelease
  8313. Hit:3 http://archive.raspberrypi.org/debian stretch InRelease
  8314. Reading package lists...
  8315. Reading package lists...
  8316. Building dependency tree...
  8317. Reading state information...
  8318. curl is already the newest version (7.52.1-5+deb9u8).
  8319. debian-goodies is already the newest version (0.69.1).
  8320. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8321. Reading package lists...
  8322. Building dependency tree...
  8323. Reading state information...
  8324. rpi-update is already the newest version (20140705).
  8325. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8326. Reading package lists...
  8327. Building dependency tree...
  8328. Reading state information...
  8329. Calculating upgrade...
  8330. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8331. Reading package lists...
  8332. Building dependency tree...
  8333. Reading state information...
  8334. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8335. Reading package lists...
  8336. Building dependency tree...
  8337. Reading state information...
  8338. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  8339. php7.2-common is already the newest version (7.2.12-1+0~20181112102304.11+stretch~1.gbp55f215).
  8340. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  8341. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  8342. Activating nc-autoupdate-nc
  8343. [ nc-autoupdate-nc ]
  8344. automatic Nextcloud updates enabled
  8345. automatic Nextcloud updates enabled
  8346.  
  8347. NextCloudPi updated to version v0.67.2
  8348.  
  8349. [ nc-restore ]
  8350. extracting backup file /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar...
  8351. tar: Unexpected EOF in archive
  8352. tar: Unexpected EOF in archive
  8353. tar: Error is not recoverable: exiting now
  8354. Cleanup...
  8355.  
  8356. [ nc-update-nextcloud ]
  8357. Nextcloud is in maintenance mode - no apps have been loaded
  8358.  
  8359. Current Nextcloud version 14.0.4.2
  8360. Available Nextcloud version 14.0.4
  8361. Nothing to update
  8362.  
  8363. [ nc-update-nextcloud ]
  8364. Nextcloud is in maintenance mode - no apps have been loaded
  8365.  
  8366. Current Nextcloud version 14.0.4.2
  8367. Available Nextcloud version 14.0.4
  8368. Nothing to update
  8369.  
  8370. [ nc-datadir ]
  8371. INFO: /media/USBdrive/ncdata is not empty. Creating backup /media/USBdrive/ncdata-12-01-18
  8372. Maintenance mode enabled
  8373. moving data dir from /var/www/nextcloud/data to /media/USBdrive/ncdata...
  8374. BTRFS filesystem detected
  8375. Create subvolume '/media/USBdrive/ncdata'
  8376. Nextcloud is in maintenance mode - no apps have been loaded
  8377.  
  8378. System config value datadirectory set to string /media/USBdrive/ncdata
  8379. Nextcloud is in maintenance mode - no apps have been loaded
  8380.  
  8381. System config value logfile set to string /media/USBdrive/ncdata/nextcloud.log
  8382. Maintenance mode disabled
  8383.  
  8384. [ nc-limits ]
  8385. Using 729176064B for PHP
  8386. Using 4 PHP threads
  8387. Using 729176064B for Redis
  8388.  
  8389. [ nc-datadir ]
  8390. INFO: data already there
  8391.  
  8392. [ nc-limits ]
  8393. Using 729176064B for PHP
  8394. Using 4 PHP threads
  8395. Using 729176064B for Redis
  8396.  
  8397. [ nc-limits ]
  8398. Using 729176064B for PHP
  8399. Using 4 PHP threads
  8400. Using 729176064B for Redis
  8401.  
  8402. [ nc-limits ]
  8403. Using 729176064B for PHP
  8404. Using 4 PHP threads
  8405. Using 729176064B for Redis
  8406.  
  8407. [ nc-limits ]
  8408. Using 729176064B for PHP
  8409. Using 4 PHP threads
  8410. Using 729176064B for Redis
  8411.  
  8412. [ nc-limits ]
  8413. Using 729176064B for PHP
  8414. Using 4 PHP threads
  8415. Using 729176064B for Redis
  8416.  
  8417. [ DDNS_no-ip ]
  8418.  
  8419. Auto configuration for Linux client of no-ip.com.
  8420.  
  8421. Only one host [mynextcloudpi.ddns.net] is registered to this account.
  8422. It will be used.
  8423.  
  8424. New configuration file '/usr/local/etc/no-ip2.conf' created.
  8425.  
  8426. System config value trusted_domains => 3 set to string mynextcloudpi.ddns.net
  8427. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  8428. noip DDNS enabled
  8429.  
  8430. [ nc-limits ]
  8431. Using 729176064B for PHP
  8432. Using 4 PHP threads
  8433. Using 729176064B for Redis
  8434.  
  8435. [ nc-limits ]
  8436. Using 729176064B for PHP
  8437. Using 4 PHP threads
  8438. Using 729176064B for Redis
  8439.  
  8440. [ nc-autoupdate-nc ]
  8441. automatic Nextcloud updates enabled
  8442.  
  8443. [ncp-update-nc]
  8444. Current Nextcloud version 14.0.4.2
  8445. Available Nextcloud version 14.0.4
  8446. Nothing to update
  8447.  
  8448. [ncp-update-nc]
  8449. Current Nextcloud version 14.0.4.2
  8450. Available Nextcloud version 14.0.4
  8451. Nothing to update
  8452.  
  8453. [ncp-update-nc]
  8454. Current Nextcloud version 14.0.4.2
  8455. Available Nextcloud version 14.0.4
  8456. Nothing to update
  8457.  
  8458. [ncp-update-nc]
  8459. Current Nextcloud version 14.0.4.2
  8460. Available Nextcloud version 14.0.4
  8461. Nothing to update
  8462.  
  8463. [ nc-limits ]
  8464. Using 729176064B for PHP
  8465. Using 4 PHP threads
  8466. Using 729176064B for Redis
  8467.  
  8468. [ nc-limits ]
  8469. Using 729176064B for PHP
  8470. Using 4 PHP threads
  8471. Using 729176064B for Redis
  8472.  
  8473. [ nc-limits ]
  8474. Using 729176064B for PHP
  8475. Using 4 PHP threads
  8476. Using 729176064B for Redis
  8477.  
  8478. [ nc-limits ]
  8479. Using 729176064B for PHP
  8480. Using 4 PHP threads
  8481. Using 729176064B for Redis
  8482.  
  8483. [ nc-limits ]
  8484. Using 729176064B for PHP
  8485. Using 4 PHP threads
  8486. Using 729176064B for Redis
  8487.  
  8488. [ nc-limits ]
  8489. Using 729176064B for PHP
  8490. Using 4 PHP threads
  8491. Using 729176064B for Redis
  8492.  
  8493. [ nc-limits ]
  8494. Using 729176064B for PHP
  8495. Using 4 PHP threads
  8496. Using 729176064B for Redis
  8497.  
  8498. [ nc-limits ]
  8499. Using 729176064B for PHP
  8500. Using 4 PHP threads
  8501. Using 729176064B for Redis
  8502.  
  8503. [ nc-limits ]
  8504. Using 729176064B for PHP
  8505. Using 4 PHP threads
  8506. Using 729176064B for Redis
  8507.  
  8508. [ nc-limits ]
  8509. Using 729176064B for PHP
  8510. Using 4 PHP threads
  8511. Using 729176064B for Redis
  8512.  
  8513. [ nc-limits ]
  8514. Using 729176064B for PHP
  8515. Using 4 PHP threads
  8516. Using 729176064B for Redis
  8517.  
  8518. [ nc-limits ]
  8519. Using 729176064B for PHP
  8520. Using 4 PHP threads
  8521. Using 729176064B for Redis
  8522.  
  8523. [ nc-limits ]
  8524. Using 729176064B for PHP
  8525. Using 4 PHP threads
  8526. Using 729176064B for Redis
  8527.  
  8528. [ nc-limits ]
  8529. Using 729176064B for PHP
  8530. Using 4 PHP threads
  8531. Using 729176064B for Redis
  8532.  
  8533. [ nc-limits ]
  8534. Using 729176064B for PHP
  8535. Using 4 PHP threads
  8536. Using 729176064B for Redis
  8537.  
  8538. [ nc-backup ]
  8539. check free space...
  8540. clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181122_1542852140.tar
  8541. Maintenance mode enabled
  8542. backup database...
  8543. backup base files...
  8544. backup data files...
  8545. [ nc-limits ]
  8546. Using 729176064B for PHP
  8547. Using 4 PHP threads
  8548. Using 729176064B for Redis
  8549.  
  8550. [ nc-scan-auto ]
  8551. automatic scans enabled
  8552.  
  8553. [ nc-backup ]
  8554. Nextcloud is in maintenance mode - no apps have been loaded
  8555.  
  8556. check free space...
  8557. clean up old backup /media/USBdrive/ncp-backups/nextcloud-bkp_20181129_1543456891.tar
  8558. Maintenance mode already enabled
  8559. backup database...
  8560. backup base files...
  8561. [ nc-limits ]
  8562. Using 729176064B for PHP
  8563. Using 4 PHP threads
  8564. Using 729176064B for Redis
  8565.  
  8566. [ncp-update-nc]
  8567. Nextcloud is in maintenance mode - no apps have been loaded
  8568.  
  8569. Current Nextcloud version 14.0.4.2
  8570. Available Nextcloud version 14.0.4
  8571. Nothing to update
  8572.  
  8573. [ncp-update-nc]
  8574. Nextcloud is in maintenance mode - no apps have been loaded
  8575.  
  8576. Current Nextcloud version 14.0.4.2
  8577. Available Nextcloud version 14.0.4
  8578. Nothing to update
  8579.  
  8580. [ nc-limits ]
  8581. Using 729176064B for PHP
  8582. Using 4 PHP threads
  8583. Using 729176064B for Redis
  8584.  
  8585. [ nc-limits ]
  8586. Using 729176064B for PHP
  8587. Using 4 PHP threads
  8588. Using 729176064B for Redis
  8589.  
  8590. [ nc-autoupdate-nc ]
  8591. automatic Nextcloud updates enabled
  8592.  
  8593. [ncp-update-nc]
  8594. Nextcloud is in maintenance mode - no apps have been loaded
  8595.  
  8596. Current Nextcloud version 14.0.4.2
  8597. Available Nextcloud version 14.0.4
  8598. Nothing to update
  8599.  
  8600. [ nc-export-ncp ]
  8601. grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
  8602. grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
  8603. configuration exported to /media/USBdrive//ncp-config_20181208.tar
  8604.  
  8605. [ nc-snapshot-auto ]
  8606. Nextcloud is in maintenance mode - no apps have been loaded
  8607.  
  8608. automatic snapshots enabled
  8609.  
  8610. [ nc-snapshot ]
  8611. Maintenance mode already enabled
  8612. Nextcloud is in maintenance mode - no apps have been loaded
  8613.  
  8614. Create a readonly snapshot of '/media/myCloudDrive/ncdata' in '/media/myCloudDrive/ncdata/../ncp-snapshots/manual_2018-12-08_161613'
  8615. snapshot manual_2018-12-08_161613 generated
  8616. Maintenance mode disabled
  8617.  
  8618. [ nc-export-ncp ]
  8619. grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
  8620. grep: /usr/local/etc/ncp-config.d/l10n: Is a directory
  8621. configuration exported to /media/USBdrive//ncp-config_20181208.tar
  8622.  
  8623. [ nc-snapshot ]
  8624. Maintenance mode enabled
  8625. Nextcloud is in maintenance mode - no apps have been loaded
  8626.  
  8627. Create a readonly snapshot of '/media/myCloudDrive/ncdata' in '/media/myCloudDrive/ncdata/../ncp-snapshots/manual_2018-12-08_170937'
  8628. snapshot manual_2018-12-08_170937 generated
  8629. Maintenance mode disabled
  8630.  
  8631. [ nc-backup-auto ]
  8632. automatic backups enabled
  8633.  
  8634. [ nc-backup ]
  8635. check free space...
  8636. Maintenance mode enabled
  8637. backup database...
  8638. [ nc-limits ]
  8639. Using 729176064B for PHP
  8640. Using 4 PHP threads
  8641. Using 729176064B for Redis
  8642.  
  8643. [ncp-update-nc]
  8644. Current Nextcloud version 14.0.4.2
  8645. Available Nextcloud version 14.0.4
  8646. Nothing to update
  8647.  
  8648. [ncp-update-nc]
  8649. Current Nextcloud version 14.0.4.2
  8650. Available Nextcloud version 14.0.4
  8651. Nothing to update
  8652.  
  8653. [ncp-update-nc]
  8654. Current Nextcloud version 14.0.4.2
  8655. Available Nextcloud version 14.0.4
  8656. Nothing to update
  8657.  
  8658. [ncp-update-nc]
  8659. Current Nextcloud version 14.0.4.2
  8660. Available Nextcloud version 14.0.4
  8661. Nothing to update
  8662.  
  8663. [ncp-update-nc]
  8664. Current Nextcloud version 14.0.4.2
  8665. Available Nextcloud version 14.0.4
  8666. Nothing to update
  8667.  
  8668. [ncp-update-nc]
  8669. Current Nextcloud version 14.0.4.2
  8670. Available Nextcloud version 14.0.4
  8671. Nothing to update
  8672.  
  8673. [ nc-limits ]
  8674. Using 729176064B for PHP
  8675. Using 4 PHP threads
  8676. Using 729176064B for Redis
  8677.  
  8678. [ nc-limits ]
  8679. Using 729176064B for PHP
  8680. Using 4 PHP threads
  8681. Using 729176064B for Redis
  8682.  
  8683. [ncp-update-nc]
  8684. Nextcloud is in maintenance mode - no apps have been loaded
  8685.  
  8686. Current Nextcloud version 14.0.4.2
  8687. Available Nextcloud version 14.0.4
  8688. Nothing to update
  8689.  
  8690. [ncp-update-nc]
  8691. Nextcloud is in maintenance mode - no apps have been loaded
  8692.  
  8693. Current Nextcloud version 14.0.4.2
  8694. Available Nextcloud version 14.0.4
  8695. Nothing to update
  8696.  
  8697. [ncp-update-nc]
  8698. Nextcloud is in maintenance mode - no apps have been loaded
  8699.  
  8700. Current Nextcloud version 14.0.4.2
  8701. Available Nextcloud version 14.0.4
  8702. Nothing to update
  8703.  
  8704. [ncp-update-nc]
  8705. Nextcloud is in maintenance mode - no apps have been loaded
  8706.  
  8707. Current Nextcloud version 14.0.4.2
  8708. Available Nextcloud version 14.0.4
  8709. Nothing to update
  8710.  
  8711. [ nc-autoupdate-nc ]
  8712. automatic Nextcloud updates enabled
  8713.  
  8714. [ncp-update-nc]
  8715. Nextcloud is in maintenance mode - no apps have been loaded
  8716.  
  8717. Current Nextcloud version 14.0.4.2
  8718. Available Nextcloud version 14.0.4
  8719. Nothing to update
  8720.  
  8721. [ncp-update-nc]
  8722. Nextcloud is in maintenance mode - no apps have been loaded
  8723.  
  8724. Current Nextcloud version 14.0.4.2
  8725. Available Nextcloud version 14.0.4
  8726. Nothing to update
  8727.  
  8728. [ncp-update-nc]
  8729. Nextcloud is in maintenance mode - no apps have been loaded
  8730.  
  8731. Current Nextcloud version 14.0.4.2
  8732. Available Nextcloud version 14.0.4
  8733. Nothing to update
  8734.  
  8735. [ nc-limits ]
  8736. Using 729176064B for PHP
  8737. Using 4 PHP threads
  8738. Using 729176064B for Redis
  8739.  
  8740. [ nc-limits ]
  8741. Using 729176064B for PHP
  8742. Using 4 PHP threads
  8743. Using 729176064B for Redis
  8744.  
  8745. [ncp-update-nc]
  8746. Nextcloud is in maintenance mode - no apps have been loaded
  8747.  
  8748. Current Nextcloud version 14.0.4.2
  8749. Available Nextcloud version 14.0.4
  8750. Nothing to update
  8751.  
  8752. [ncp-update-nc]
  8753. Nextcloud is in maintenance mode - no apps have been loaded
  8754.  
  8755. Current Nextcloud version 14.0.4.2
  8756. Available Nextcloud version 14.0.4
  8757. Nothing to update
  8758.  
  8759. [ncp-update-nc]
  8760. Nextcloud is in maintenance mode - no apps have been loaded
  8761.  
  8762. Current Nextcloud version 14.0.4.2
  8763. Available Nextcloud version 14.0.4
  8764. Nothing to update
  8765.  
  8766. [ncp-update-nc]
  8767. Nextcloud is in maintenance mode - no apps have been loaded
  8768.  
  8769. Current Nextcloud version 14.0.4.2
  8770. Available Nextcloud version 14.0.4
  8771. Nothing to update
  8772.  
  8773. [ncp-update-nc]
  8774. Nextcloud is in maintenance mode - no apps have been loaded
  8775.  
  8776. Current Nextcloud version 14.0.4.2
  8777. Available Nextcloud version 14.0.4
  8778. Nothing to update
  8779.  
  8780. [ncp-update-nc]
  8781. Current Nextcloud version 14.0.4.2
  8782. Available Nextcloud version 14.0.4
  8783. Nothing to update
  8784.  
  8785. [ncp-update-nc]
  8786. Current Nextcloud version 14.0.4.2
  8787. Available Nextcloud version 14.0.4
  8788. Nothing to update
  8789.  
  8790. [ nc-limits ]
  8791. Using 729176064B for PHP
  8792. Using 4 PHP threads
  8793. Using 729176064B for Redis
  8794.  
  8795. [ nc-limits ]
  8796. Using 729176064B for PHP
  8797. Using 4 PHP threads
  8798. Using 729176064B for Redis
  8799.  
  8800. [ nc-autoupdate-nc ]
  8801. automatic Nextcloud updates enabled
  8802.  
  8803. [ncp-update-nc]
  8804. Nextcloud is in maintenance mode - no apps have been loaded
  8805.  
  8806. Current Nextcloud version 14.0.4.2
  8807. Available Nextcloud version 14.0.4
  8808. Nothing to update
  8809.  
  8810. [ letsencrypt ]
  8811. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  8812. Cert is due for renewal, auto-renewing...
  8813. Renewing an existing certificate
  8814. Performing the following challenges:
  8815. http-01 challenge for mynextcloudpi.ddns.net
  8816. Using the webroot path /var/www/nextcloud for all unmatched domains.
  8817. Waiting for verification...
  8818. Cleaning up challenges
  8819. Failed authorization procedure. mynextcloudpi.ddns.net (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://mynextcloudpi.ddns.net/.well-known/acme-challenge/QtndvzqaJe7Pj5k16HwFxte19zOtfLdeIpL1NR_xRHY: Timeout during connect (likely firewall problem)
  8820. IMPORTANT NOTES:
  8821. - The following errors were reported by the server:
  8822.  
  8823. Domain: mynextcloudpi.ddns.net
  8824. Type: connection
  8825. Detail: Fetching
  8826. http://mynextcloudpi.ddns.net/.well-known/acme-challenge/QtndvzqaJe7Pj5k16HwFxte19zOtfLdeIpL1NR_xRHY:
  8827. Timeout during connect (likely firewall problem)
  8828.  
  8829. To fix these errors, please make sure that your domain name was
  8830. entered correctly and the DNS A record(s) for that domain
  8831. contain(s) the right IP address. Additionally, please check that
  8832. your computer has a publicly routable IP address and that no
  8833. firewalls are preventing the server from communicating with the
  8834. client. If you're using the webroot plugin, you should also verify
  8835. that you are serving files from the webroot path you provided.
  8836.  
  8837. [ letsencrypt ]
  8838. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  8839. Cert is due for renewal, auto-renewing...
  8840. Renewing an existing certificate
  8841. Performing the following challenges:
  8842. http-01 challenge for mynextcloudpi.ddns.net
  8843. Using the webroot path /var/www/nextcloud for all unmatched domains.
  8844. Waiting for verification...
  8845. Cleaning up challenges
  8846. Generating key (2048 bits): /etc/letsencrypt/keys/0002_key-certbot.pem
  8847. Creating CSR: /etc/letsencrypt/csr/0002_csr-certbot.pem
  8848. IMPORTANT NOTES:
  8849. - Congratulations! Your certificate and chain have been saved at
  8850. /etc/letsencrypt/live/mynextcloudpi.ddns.net/fullchain.pem. Your
  8851. cert will expire on 2019-03-29. To obtain a new or tweaked version
  8852. of this certificate in the future, simply run certbot again. To
  8853. non-interactively renew *all* of your certificates, run "certbot
  8854. renew"
  8855. - If you like Certbot, please consider supporting our work by:
  8856.  
  8857. Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
  8858. Donating to EFF: https://eff.org/donate-le
  8859.  
  8860. System config value trusted_domains => 4 set to string mynextcloudpi.ddns.net
  8861. System config value overwrite.cli.url set to string https://mynextcloudpi.ddns.net/
  8862.  
  8863. [ nc-update-nextcloud ]
  8864. Current Nextcloud version 14.0.4.2
  8865. Available Nextcloud version 14.0.4
  8866. Nothing to update
  8867.  
  8868. [ nc-update ]
  8869. Downloading updates
  8870. Performing updates
  8871. Installing nc-backup
  8872. Installing nc-restore
  8873. Reading package lists...
  8874. Building dependency tree...
  8875. Reading state information...
  8876. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  8877. php7.2-common is already the newest version (7.2.13-1+0~20181207100540.13+stretch~1.gbpf57305).
  8878. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  8879. 0 upgraded, 0 newly installed, 0 to remove and 12 not upgraded.
  8880. Activating nc-autoupdate-nc
  8881. [ nc-autoupdate-nc ]
  8882. automatic Nextcloud updates enabled
  8883. automatic Nextcloud updates enabled
  8884.  
  8885. NextCloudPi updated to version v0.67.11
  8886.  
  8887. [ nc-update-nextcloud ]
  8888. Current Nextcloud version 14.0.4.2
  8889. Available Nextcloud version 15.0.0
  8890. Download Nextcloud 15.0.0...
  8891. Back up current instance...
  8892. check free space...
  8893. Maintenance mode enabled
  8894. backup database...
  8895. backup base files...
  8896. compressing backup file...
  8897. backup /var/www//nextcloud-bkp_20181229_1546115116.tar.gz generated
  8898. Maintenance mode disabled
  8899. Install Nextcloud 15.0.0...
  8900. Restore apps...
  8901. * admin_notifications
  8902. * bruteforcesettings
  8903. * calendar
  8904. * contacts
  8905. * files_antivirus
  8906. * fulltextsearch
  8907. * gpxedit
  8908. * news
  8909. * notes
  8910. * previewgenerator
  8911. * ransomware_protection
  8912. * tasks
  8913. * unsplash
  8914. Fix permissions...
  8915. Upgrade...
  8916. Nextcloud or one of the apps require upgrade - only a limited number of commands are available
  8917. You may use your browser or the occ upgrade command to do the upgrade
  8918. Set log level to debug
  8919. Turned on maintenance mode
  8920. Updating database schema
  8921. Updated database
  8922. Updating <accessibility> ...
  8923. Updated <accessibility> to 1.1.0
  8924. Updating <federatedfilesharing> ...
  8925. Updated <federatedfilesharing> to 1.5.0
  8926. Updating <files_pdfviewer> ...
  8927. Updated <files_pdfviewer> to 1.4.0
  8928. Updating <files_texteditor> ...
  8929. Updated <files_texteditor> to 2.7.0
  8930. Updating <files_videoplayer> ...
  8931. Updated <files_videoplayer> to 1.4.0
  8932. Updating <gallery> ...
  8933. Updated <gallery> to 18.2.0
  8934. Updating <password_policy> ...
  8935. Updated <password_policy> to 1.5.0
  8936. Updating <provisioning_api> ...
  8937. Updated <provisioning_api> to 1.5.0
  8938. Updating <serverinfo> ...
  8939. Updated <serverinfo> to 1.5.0
  8940. Updating <twofactor_backupcodes> ...
  8941. Updated <twofactor_backupcodes> to 1.4.1
  8942. Updating <updatenotification> ...
  8943. Updated <updatenotification> to 1.5.0
  8944. Updating <lookup_server_connector> ...
  8945. Updated <lookup_server_connector> to 1.3.0
  8946. Updating <oauth2> ...
  8947. Updated <oauth2> to 1.3.0
  8948. Updating <files> ...
  8949. Updated <files> to 1.10.0
  8950. Updating <activity> ...
  8951. Updated <activity> to 2.8.2
  8952. Updating <cloud_federation_api> ...
  8953. Updated <cloud_federation_api> to 0.1.0
  8954. Updating <dav> ...
  8955. Fix broken values of calendar objects
  8956.  
  8957. Starting ...
  8958. 0/0 [>---------------------------] 0%
  8959. Updated <dav> to 1.8.0
  8960. Updating <files_sharing> ...
  8961. Updated <files_sharing> to 1.7.0
  8962. Updating <files_trashbin> ...
  8963. Updated <files_trashbin> to 1.5.0
  8964. Updating <files_versions> ...
  8965. Updated <files_versions> to 1.8.0
  8966. Updating <sharebymail> ...
  8967. Updated <sharebymail> to 1.5.0
  8968. Updating <workflowengine> ...
  8969. Updated <workflowengine> to 1.5.0
  8970. Updating <firstrunwizard> ...
  8971. Updated <firstrunwizard> to 2.4.0
  8972. Updating <nextcloud_announcements> ...
  8973. Updated <nextcloud_announcements> to 1.4.0
  8974. Updating <notifications> ...
  8975. Updated <notifications> to 2.3.0
  8976. Updating <theming> ...
  8977. Updated <theming> to 1.6.0
  8978. Checking for update of app accessibility in appstore
  8979. Checked for update of app "accessibility" in appstore
  8980. Checking for update of app activity in appstore
  8981. Checked for update of app "activity" in appstore
  8982. Checking for update of app bruteforcesettings in appstore
  8983. Update app bruteforcesettings from appstore
  8984. Checked for update of app "bruteforcesettings" in appstore
  8985. Checking for update of app calendar in appstore
  8986. Checked for update of app "calendar" in appstore
  8987. Checking for update of app cloud_federation_api in appstore
  8988. Checked for update of app "cloud_federation_api" in appstore
  8989. Checking for update of app contacts in appstore
  8990. Update app contacts from appstore
  8991. Checked for update of app "contacts" in appstore
  8992. Checking for update of app dav in appstore
  8993. Checked for update of app "dav" in appstore
  8994. Checking for update of app federatedfilesharing in appstore
  8995. Checked for update of app "federatedfilesharing" in appstore
  8996. Checking for update of app files in appstore
  8997. Checked for update of app "files" in appstore
  8998. Checking for update of app files_pdfviewer in appstore
  8999. Checked for update of app "files_pdfviewer" in appstore
  9000. Checking for update of app files_sharing in appstore
  9001. Checked for update of app "files_sharing" in appstore
  9002. Checking for update of app files_texteditor in appstore
  9003. Checked for update of app "files_texteditor" in appstore
  9004. Checking for update of app files_trashbin in appstore
  9005. Checked for update of app "files_trashbin" in appstore
  9006. Checking for update of app files_versions in appstore
  9007. Checked for update of app "files_versions" in appstore
  9008. Checking for update of app files_videoplayer in appstore
  9009. Checked for update of app "files_videoplayer" in appstore
  9010. Checking for update of app firstrunwizard in appstore
  9011. Checked for update of app "firstrunwizard" in appstore
  9012. Checking for update of app gallery in appstore
  9013. Checked for update of app "gallery" in appstore
  9014. Checking for update of app logreader in appstore
  9015. Checked for update of app "logreader" in appstore
  9016. Checking for update of app lookup_server_connector in appstore
  9017. Checked for update of app "lookup_server_connector" in appstore
  9018. Checking for update of app nextcloud_announcements in appstore
  9019. Checked for update of app "nextcloud_announcements" in appstore
  9020. Checking for update of app notes in appstore
  9021. Checked for update of app "notes" in appstore
  9022. Checking for update of app notifications in appstore
  9023. Checked for update of app "notifications" in appstore
  9024. Checking for update of app oauth2 in appstore
  9025. Checked for update of app "oauth2" in appstore
  9026. Checking for update of app password_policy in appstore
  9027. Checked for update of app "password_policy" in appstore
  9028. Checking for update of app previewgenerator in appstore
  9029. Checked for update of app "previewgenerator" in appstore
  9030. Checking for update of app provisioning_api in appstore
  9031. Checked for update of app "provisioning_api" in appstore
  9032. Checking for update of app serverinfo in appstore
  9033. Checked for update of app "serverinfo" in appstore
  9034. Checking for update of app sharebymail in appstore
  9035. Checked for update of app "sharebymail" in appstore
  9036. Checking for update of app support in appstore
  9037. Checked for update of app "support" in appstore
  9038. Checking for update of app tasks in appstore
  9039. Checked for update of app "tasks" in appstore
  9040. Checking for update of app theming in appstore
  9041. Checked for update of app "theming" in appstore
  9042. Checking for update of app twofactor_backupcodes in appstore
  9043. Checked for update of app "twofactor_backupcodes" in appstore
  9044. Checking for update of app unsplash in appstore
  9045. Checked for update of app "unsplash" in appstore
  9046. Checking for update of app updatenotification in appstore
  9047. Checked for update of app "updatenotification" in appstore
  9048. Checking for update of app workflowengine in appstore
  9049. Checked for update of app "workflowengine" in appstore
  9050. Starting code integrity check...
  9051. Finished code integrity check
  9052. Update successful
  9053. Turned off maintenance mode
  9054. Reset log level
  9055. Check indices of the share table.
  9056. Adding additional owner index to the share table, this can take some time...
  9057. Share table updated successfully.
  9058. Adding additional initiator index to the share table, this can take some time...
  9059. Share table updated successfully.
  9060. Backup stored at /media/USBdrive/ncdata/ncp-update-backups/nextcloud-bkp_20181229_1546115116-14.0.4.2.tar.gz
  9061. Clean up...
  9062.  
  9063. [ncp-update-nc]
  9064. Current Nextcloud version 15.0.0.10
  9065. Available Nextcloud version 14.0.4
  9066. Nothing to update
  9067.  
  9068. [ncp-update-nc]
  9069. Current Nextcloud version 15.0.0.10
  9070. Available Nextcloud version 14.0.4
  9071. Nothing to update
  9072.  
  9073. [ nc-limits ]
  9074. Using 729176064B for PHP
  9075. Using 4 PHP threads
  9076. Using 729176064B for Redis
  9077.  
  9078. [ nc-limits ]
  9079. Using 729176064B for PHP
  9080. Using 4 PHP threads
  9081. Using 729176064B for Redis
  9082.  
  9083. [ncp-update-nc]
  9084. Nextcloud is in maintenance mode - no apps have been loaded
  9085.  
  9086. Current Nextcloud version 15.0.0.10
  9087. Available Nextcloud version 14.0.4
  9088. Nothing to update
  9089.  
  9090. [ncp-update-nc]
  9091. Nextcloud is in maintenance mode - no apps have been loaded
  9092.  
  9093. Current Nextcloud version 15.0.0.10
  9094. Available Nextcloud version 14.0.4
  9095. Nothing to update
  9096.  
  9097. [ nc-autoupdate-nc ]
  9098. automatic Nextcloud updates enabled
  9099.  
  9100. [ nc-update ]
  9101. Downloading updates
  9102. Performing updates
  9103. Installing nc-backup
  9104. Installing nc-restore
  9105. Reading package lists...
  9106. Building dependency tree...
  9107. Reading state information...
  9108. php-imagick is already the newest version (3.4.3-4+0~20181107094738.8+stretch~1.gbpba1eeb).
  9109. php7.2-common is already the newest version (7.2.13-1+0~20181207100540.13+stretch~1.gbpf57305).
  9110. imagemagick is already the newest version (8:6.9.10.8+dfsg-1).
  9111. 0 upgraded, 0 newly installed, 0 to remove and 12 not upgraded.
  9112. Activating nc-autoupdate-nc
  9113. [ nc-autoupdate-nc ]
  9114. automatic Nextcloud updates enabled
  9115. automatic Nextcloud updates enabled
  9116.  
  9117. NextCloudPi updated to version v0.67.11
  9118.  
  9119. [ nc-update-nextcloud ]
  9120. Current Nextcloud version 15.0.0.10
  9121. Available Nextcloud version 15.0.0
  9122. Nothing to update
  9123.  
  9124. [ nc-autoupdate-ncp ]
  9125. automatic NextCloudPi updates enabled
  9126.  
  9127. [ nc-autoupdate-nc ]
  9128. automatic Nextcloud updates enabled
  9129.  
  9130. [ncp-update-nc]
  9131. Current Nextcloud version 15.0.0.10
  9132. Available Nextcloud version 14.0.4
  9133. Nothing to update
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement