How to deal with all the exploitable apps and lack of protection, wrongly set permissions etc in a quick way?


#1

For the last 5 hours I have been trying to fix all the issues that lynis gives.
Interesting and I learn a lot. But a fresh install of nextcloudpi should not be connected to the internet.

I’ve solved almost everything. But I am stuck at all the software that will not update with apt-get update. The reason is that updating those will break the whole nextcloud, or what?

Please make future releases more secure and let me know how I can fix these things faster when I have to.


#2

Hi,

Could you maybe post the test results here (blank out your domain name and other sensitive information), so we know which insecurities you’re actually talking about?
But might be very interesting for others to compare with their systems. :slight_smile:
Thanks


#3

I’m giving up on nextcloudpi and switch to owncloud through DietPi.

The external websites and/or google drive app crashed my database I think.
Logging in to ssh stopped working and reaching :4443 was impossible after fixing a lot of problems. But this was one of the outputs of the audits I received:

Especially this part worries me because I could not solve them:
“Known vulnerabilities in this system” somewhere near the end.

Perform a security audit with lynis and debsecan

Run
[ nc-audit ]
General security audit

[ Lynis 2.4.0 ]

################################################################################
Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
welcome to redistribute it under the terms of the GNU General Public License.
See the LICENSE file for details about using this software.

2007-2016, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)
################################################################################

[+] Initializing program

e[2C- Detecting OS… e[41C [ DONE ]
e[2C- Checking profiles…e[37C [ DONE ]


Program version: 2.4.0
Operating system: Linux
Operating system name: Debian
Operating system version: 9.6
Kernel version: 4.14.79
Hardware platform: armv7l
Hostname: nextcloudpi

Profiles: /etc/lynis/default.prf /etc/lynis/ncp.prf
Log file: /var/log/lynis.log
Report file: /var/log/lynis-report.dat
Report version: 1.0
Plugin directory: /etc/lynis/plugins

Auditor: [Not Specified]
Test category: all
Test group: all

e[2C- Program update status… e[32C [ WARNING ]

===============================================================================
Lynis update available

Current version is more than 4 months old

Current version : 240 Latest version : 270

Please update to the latest version.
New releases include additional features, bug fixes, tests and baselines.

Download the latest version:
Packages (DEB/RPM) - https://packages.cisofy.com
Website - https://cisofy.com/downloads/
GitHub - https://github.com/CISOfy/lynis

===============================================================================

[+] System Tools

e[2C- Scanning available tools…e[30C
e[2C- Checking system binaries…e[30C

[+] Plugins (phase 1)

e[0CNote: plugins have more extensive tests and may take several minutes to completee[0C
e[0C e[0C
e[2C- Plugin: debiane[43C
[
[+] Debian Tests

e[2C- Checking for system binaries that are required by Debian Tests…e[0C
e[4C- Checking /bin… e[38C [ FOUND ]
e[4C- Checking /sbin… e[37C [ FOUND ]
e[4C- Checking /usr/bin… e[34C [ FOUND ]
e[4C- Checking /usr/sbin… e[33C [ FOUND ]
e[4C- Checking /usr/local/bin… e[28C [ FOUND ]
e[4C- Checking /usr/local/sbin… e[27C [ FOUND ]
e[2C- Authentication:e[42C
e[4C- PAM (Pluggable Authentication Modules):e[16C
e[6C- libpam-tmpdire[40C [ Not Installed ]
e[6C- libpam-usbe[43C [ Not Installed ]
e[2C- File System Checks:e[38C
e[4C- DM-Crypt, Cryptsetup & Cryptmount:e[21C
e[2C- Software:e[48C
e[4C- apt-listchangese[40C [ Installed and enabled for apt ]
e[4C- checkrestarte[43C [ Installed ]
e[4C- needrestarte[44C [ Not Installed ]
e[4C- debsecane[47C [ Installed and enabled for cron ]
e[4C- debsumse[48C [ Installed and enabled for cron ]
e[4C- fail2bane[47C [ Installed with jail.local ]
]

[+] Boot and services

e[2C- Service Managere[42C [ systemd ]
e[2C- Checking UEFI boote[39C [ DISABLED ]
e[4C- Boot loadere[44C [ NONE FOUND ]
e[2C- Check running services (systemctl)e[23C [ DONE ]
e[8CResult: found 26 running servicese[20C
e[2C- Check enabled services at boot (systemctl)e[15C [ DONE ]
e[8CResult: found 44 enabled servicese[20C
e[2C- Check startup files (permissions)e[24C [ OK ]

[+] Kernel

e[2C- Checking default run levele[31C [ RUNLEVEL 5 ]
e[2C- Checking kernel version and releasee[22C [ DONE ]
e[2C- Checking kernel typee[37C [ DONE ]
e[2C- Checking loaded kernel modulese[27C [ DONE ]
e[6CFound 64 active modulese[32C
e[2C- Checking Linux kernel configuration filee[17C [ NOT FOUND ]
e[2C- Checking core dumps configuratione[24C [ DISABLED ]
e[4C- Checking setuid core dumps configuratione[15C [ DEFAULT ]
e[2C- Check if reboot is needede[32C [ UNKNOWN ]

[+] Memory and Processes

e[2C- Checking /proc/meminfoe[35C [ FOUND ]
e[2C- Searching for dead/zombie processese[22C [ OK ]
e[2C- Searching for IO waiting processese[23C [ OK ]

[+] Users, Groups and Authentication

e[2C- Administrator accountse[35C [ OK ]
e[2C- Unique UIDse[46C [ OK ]
e[2C- Consistency of group files (grpck)e[23C [ OK ]
e[2C- Unique group IDse[41C [ OK ]
e[2C- Unique group namese[39C [ OK ]
e[2C- Password file consistencye[32C [ OK ]
e[2C- Query system users (non daemons)e[25C [ DONE ]
e[2C- NIS+ authentication supporte[30C [ NOT ENABLED ]
e[2C- NIS authentication supporte[31C [ NOT ENABLED ]
e[2C- sudoers filee[45C [ FOUND ]
e[4C- Check sudoers file permissionse[25C [ OK ]
e[2C- PAM password strength toolse[30C [ SUGGESTION ]
e[2C- PAM configuration files (pam.conf)e[23C [ FOUND ]
e[2C- PAM configuration files (pam.d)e[26C [ FOUND ]
e[2C- PAM modulese[46C [ NOT FOUND ]
e[2C- LDAP module in PAMe[39C [ NOT FOUND ]
e[2C- Accounts without expire datee[29C [ OK ]
e[2C- Accounts without passworde[32C [ OK ]
e[2C- Checking user password aging (minimum)e[19C [ DISABLED ]
e[2C- User password aging (maximum)e[28C [ DISABLED ]
e[2C- Checking expired passwordse[31C [ OK ]
e[2C- Checking Linux single user mode authenticatione[11C [ OK ]
e[2C- Determining default umaske[32C
e[4C- umask (/etc/profile)e[35C [ NOT FOUND ]
e[4C- umask (/etc/login.defs)e[32C [ OK ]
e[2C- LDAP authentication supporte[30C [ NOT ENABLED ]
e[2C- Logging failed login attemptse[28C [ ENABLED ]

[+] Shells

e[2C- Checking shells from /etc/shellse[25C
e[4CResult: found 4 shells (valid shells: 4).e[16C
e[4C- Session timeout settings/toolse[25C [ NONE ]
e[2C- Checking default umask valuese[28C
e[4C- Checking default umask in /etc/bash.bashrce[13C [ NONE ]
e[4C- Checking default umask in /etc/profilee[17C [ NONE ]

[+] File systems

e[2C- Query swap partitions (fstab)e[28C [ NONE ]
e[2C- Testing swap partitionse[34C [ OK ]
e[2C- Testing /proc mount (hidepid)e[28C [ SUGGESTION ]
e[2C- Checking for old files in /tmpe[27C [ OK ]
e[2C- Checking /tmp sticky bite[33C [ OK ]
e[2C- ACL support root file systeme[29C [ ENABLED ]
e[2C- Mount options of /e[39C [ NON DEFAULT ]
e[2C- Mount options of /boote[35C [ NON DEFAULT ]
e[2C- Disable kernel support of some filesystemse[15C
e[4C- Discovered kernel modules: hfs hfsplus jffs2 squashfs udf e[0C

[+] Storage

e[2C- Checking USB devices authorizatione[23C [ ENABLED ]

[+] NFS

e[2C- Query rpc registered programse[28C [ DONE ]
e[2C- Query NFS versionse[39C [ DONE ]
e[2C- Query NFS protocolse[38C [ DONE ]
e[2C- Check running NFS daemone[33C [ NOT FOUND ]

[+] Name services

e[2C- Checking default DNS search domaine[23C [ FOUND ]
e[2C- Checking /etc/hostse[38C
e[4C- Checking /etc/hosts (duplicates)e[23C [ OK ]
e[4C- Checking /etc/hosts (hostname)e[25C [ OK ]
e[4C- Checking /etc/hosts (localhost)e[24C [ OK ]

[+] Ports and packages

e[2C- Searching package managerse[31C
e[4C- Searching dpkg package managere[25C [ FOUND ]
e[6C- Querying package managere[29C
e[4C- Query unpurged packagese[32C [ NONE ]
e[4C- debsecan utilitye[39C [ FOUND ]
e[6C- debsecan cron jobe[36C [ FOUND ]
e[4C- debsums utilitye[40C [ FOUND ]
e[6C- Cron job for debsumse[33C [ FOUND ]
e[2C- Checking vulnerable packages (apt-get only)e[14C [ DONE ]
e[2C- Checking package audit toole[30C [ INSTALLED ]
e[4CFound: apt-gete[43C

[+] Networking

e[2C- Checking IPv6 configuratione[30C [ ENABLED ]
e[6CConfiguration methode[35C [ AUTO ]
e[6CIPv6 onlye[46C [ NO ]
e[2C- Checking configured nameserverse[26C
e[4C- Testing nameserverse[36C
e[8CNameserver: 127.0.0.1e[32C [ OK ]
e[2C- Checking default gatewaye[33C [ DONE ]
e[2C- Getting listening ports (TCP/UDP)e[24C [ DONE ]
e[6C* Found 17 portse[39C
e[2C- Checking promiscuous interfacese[26C [ OK ]
e[2C- Checking waiting connectionse[29C [ OK ]
e[2C- Checking status DHCP cliente[30C [ NOT ACTIVE ]
e[2C- Checking for ARP monitoring softwaree[21C [ NOT FOUND ]

[+] Printers and Spools

e[2C- Checking cups daemone[37C [ NOT FOUND ]
e[2C- Checking lp daemone[39C [ NOT RUNNING ]

[+] Software: e-mail and messaging

e[2C- Checking Exim statuse[37C [ NOT FOUND ]
e[2C- Checking Postfix statuse[34C [ RUNNING ]
e[2C- Checking Postfix configuratione[27C [ FOUND ]
e[4C- Postfix bannere[41C [ WARNING ]
e[2C- Checking Dovecot statuse[34C [ NOT FOUND ]
e[2C- Checking Qmail statuse[36C [ NOT FOUND ]
e[2C- Checking Sendmail statuse[33C [ NOT FOUND ]

[+] Software: firewalls

e[2C- Checking iptables kernel modulee[26C [ FOUND ]
e[4C- Checking iptables policies of chainse[19C [ FOUND ]
e[4C- Checking for empty rulesete[29C [ OK ]
e[2C- Checking host based firewalle[29C [ ACTIVE ]

[+] Software: webserver

e[2C- Checking Apache (binary /usr/sbin/apache2)e[15C [ FOUND ]
e[6CInfo: Found 3 virtual hostse[28C
e[4C* Loadable modulese[39C [ FOUND ]
e[8C- Found 116 loadable modulese[25C
e[10CModSecurity: web application firewalle[14C [ FOUND ]
e[2C- Checking nginxe[43C [ NOT FOUND ]

[+] SSH Support

e[2C- Checking running SSH daemone[30C [ FOUND ]
e[4C- Searching SSH configuratione[28C [ FOUND ]
e[4C- SSH option: AllowTcpForwardinge[25C [ OK ]
e[4C- SSH option: ClientAliveCountMaxe[24C [ OK ]
e[4C- SSH option: ClientAliveIntervale[24C [ OK ]
e[4C- SSH option: Compressione[32C [ OK ]
e[4C- SSH option: FingerprintHashe[28C [ OK ]
e[4C- SSH option: GatewayPortse[31C [ OK ]
e[4C- SSH option: IgnoreRhostse[31C [ OK ]
e[4C- SSH option: LoginGraceTimee[29C [ OK ]
e[4C- SSH option: LogLevele[35C [ OK ]
e[4C- SSH option: MaxAuthTriese[31C [ SUGGESTION ]
e[4C- SSH option: MaxSessionse[32C [ OK ]
e[4C- SSH option: PermitRootLogine[28C [ OK ]
e[4C- SSH option: PermitUserEnvironmente[22C [ OK ]
e[4C- SSH option: PermitTunnele[31C [ OK ]
e[4C- SSH option: Porte[39C [ SUGGESTION ]
e[4C- SSH option: PrintLastLoge[31C [ OK ]
e[4C- SSH option: Protocole[35C [ NOT FOUND ]
e[4C- SSH option: StrictModese[32C [ OK ]
e[4C- SSH option: TCPKeepAlivee[31C [ OK ]
e[4C- SSH option: UseDNSe[37C [ OK ]
e[4C- SSH option: UsePrivilegeSeparatione[21C [ OK ]
e[4C- SSH option: VerifyReverseMappinge[23C [ NOT FOUND ]
e[4C- SSH option: X11Forwardinge[30C [ OK ]
e[4C- SSH option: AllowAgentForwardinge[23C [ OK ]
e[4C- SSH option: AllowUserse[33C [ NOT FOUND ]
e[4C- SSH option: AllowGroupse[32C [ NOT FOUND ]

[+] SNMP Support

e[2C- Checking running SNMP daemone[29C [ NOT FOUND ]

[+] Databases

e[2C- MySQL process statuse[37C [ FOUND ]
e[2C- Redis (server) statuse[36C [ FOUND ]
e[4C- Redis (requirepass configured)e[25C [ FOUND ]
e[4C- Redis (rename of CONFIG command)e[23C [ FOUND ]
e[4C- Redis (bind on localhost)e[30C [ FOUND ]

[+] LDAP Services

e[2C- Checking OpenLDAP instancee[31C [ NOT FOUND ]

[+] PHP

e[2C- Checking PHPe[45C [ NOT FOUND ]

[+] Squid Support

e[2C- Checking running Squid daemone[28C [ NOT FOUND ]

[+] Logging and files

e[2C- Checking for a running log daemone[24C [ OK ]
e[4C- Checking Syslog-NG statuse[30C [ NOT FOUND ]
e[4C- Checking systemd journal statuse[24C [ FOUND ]
e[4C- Checking Metalog statuse[32C [ NOT FOUND ]
e[4C- Checking RSyslog statuse[32C [ FOUND ]
e[4C- Checking RFC 3195 daemon statuse[24C [ NOT FOUND ]
e[4C- Checking minilogd instancese[28C [ NOT FOUND ]
e[2C- Checking logrotate presencee[30C [ OK ]
e[2C- Checking log directories (static list)e[19C [ DONE ]
e[2C- Checking open log filese[34C [ DONE ]
e[2C- Checking deleted files in usee[28C [ FILES FOUND ]

[+] Insecure services

e[2C- Checking inetd statuse[36C [ NOT ACTIVE ]

[+] Banners and identification

e[2C- /etc/issuee[47C [ FOUND ]
e[4C- /etc/issue contentse[36C [ WEAK ]
e[2C- /etc/issue.nete[43C [ FOUND ]
e[4C- /etc/issue.net contentse[32C [ WEAK ]

[+] Scheduled tasks

e[2C- Checking crontab/cronjobe[33C [ DONE ]

[+] Accounting

e[2C- Checking accounting informatione[26C [ NOT FOUND ]
e[2C- Checking sysstat accounting datae[25C [ NOT FOUND ]

[+] Time and Synchronization

e[2C- NTP daemon found: systemd (timesyncd)e[20C [ FOUND ]
e[2C- Checking for a running NTP daemon or cliente[14C [ OK ]

[+] Cryptography

e[2C- Checking for expired SSL certificatese[20C [ NONE ]

[+] Virtualization

[+] Containers

[+] Security frameworks

e[2C- Checking presence AppArmore[31C [ NOT FOUND ]
e[2C- Checking presence SELinuxe[32C [ NOT FOUND ]
e[2C- Checking presence grsecuritye[29C [ NOT FOUND ]
e[2C- Checking for implemented MAC frameworke[19C [ NONE ]

[+] Software: file integrity

e[2C- Checking file integrity toolse[28C
e[2C- Checking presence integrity toole[25C [ NOT FOUND ]

[+] Software: System tooling

e[2C- Checking presence of Fail2bane[28C [ FOUND ]
WARNING ‘backend’ not defined in ‘ssh’. Using default one: ‘auto’
WARNING ‘backend’ not defined in ‘nextcloud’. Using default one: ‘auto’
e[4C- Checking Fail2ban jailse[32C [ ENABLED ]
e[2C- Checking for IDS/IPS toolinge[29C [ FOUND ]

[+] Software: Malware

[+] File Permissions

e[2C- Starting file permissions checke[26C
e[4C/etc/lilo.confe[43C [ NOT FOUND ]
e[4C/root/.sshe[47C [ OK ]
e[4C/etc/lilo.confe[43C [ NOT FOUND ]
e[4C/root/.sshe[47C [ OK ]

[+] Home directories

e[2C- Checking shell history filese[29C [ OK ]

[+] Kernel Hardening

e[2C- Comparing sysctl key pairs with scan profilee[13C
e[4C- kernel.core_uses_pid (exp: 1)e[26C [ OK ]
e[4C- kernel.ctrl-alt-del (exp: 0)e[27C [ OK ]
e[4C- kernel.kptr_restrict (exp: 2)e[26C [ OK ]
e[4C- kernel.randomize_va_space (exp: 2)e[21C [ OK ]
e[4C- kernel.sysrq (exp: 0)e[34C [ OK ]
e[4C- net.ipv4.conf.all.accept_redirects (exp: 0)e[12C [ OK ]
e[4C- net.ipv4.conf.all.accept_source_route (exp: 0)e[9C [ OK ]
e[4C- net.ipv4.conf.all.bootp_relay (exp: 0)e[17C [ OK ]
e[4C- net.ipv4.conf.all.forwarding (exp: 0)e[18C [ OK ]
e[4C- net.ipv4.conf.all.log_martians (exp: 1)e[16C [ DIFFERENT ]
e[4C- net.ipv4.conf.all.mc_forwarding (exp: 0)e[15C [ OK ]
e[4C- net.ipv4.conf.all.proxy_arp (exp: 0)e[19C [ OK ]
e[4C- net.ipv4.conf.all.rp_filter (exp: 1)e[19C [ OK ]
e[4C- net.ipv4.conf.all.send_redirects (exp: 0)e[14C [ OK ]
e[4C- net.ipv4.conf.default.accept_redirects (exp: 0)e[8C [ OK ]
e[4C- net.ipv4.conf.default.accept_source_route (exp: 0)e[5C [ OK ]
e[4C- net.ipv4.conf.default.log_martians (exp: 1)e[12C [ DIFFERENT ]
e[4C- net.ipv4.icmp_echo_ignore_broadcasts (exp: 1)e[10C [ OK ]
e[4C- net.ipv4.icmp_ignore_bogus_error_responses (exp: 1)e[4C [ OK ]
e[4C- net.ipv4.tcp_syncookies (exp: 1)e[23C [ OK ]
e[4C- net.ipv4.tcp_timestamps (exp: 0)e[23C [ OK ]
e[4C- net.ipv6.conf.all.accept_redirects (exp: 0)e[12C [ OK ]
e[4C- net.ipv6.conf.all.accept_source_route (exp: 0)e[9C [ OK ]
e[4C- net.ipv6.conf.default.accept_redirects (exp: 0)e[8C [ OK ]
e[4C- net.ipv6.conf.default.accept_source_route (exp: 0)e[5C [ OK ]

[+] Hardening

e[4C- Installed compiler(s)e[34C [ FOUND ]
e[4C- Installed malware scannere[30C [ NOT FOUND ]
e[4C- Installed malware scannere[30C [ NOT FOUND ]

[+] Custom Tests

e[2C- Running custom tests… e[33C [ NONE ]

[+] Plugins (phase 2)

================================================================================

-[ Lynis 2.4.0 Results ]-

Warnings (2):

! Version of Lynis is very old and should be updated [LYNIS]
https://cisofy.com/controls/LYNIS/

! Found mail_name in SMTP banner, and/or mail_name contains ‘Postfix’ [MAIL-8818]
https://cisofy.com/controls/MAIL-8818/

Suggestions (19):

  • Consider hardening SSH configuration [SSH-7408]

Follow-up:

  • Show details of a test (lynis show details TEST-ID)
  • Check the logfile for all details (less /var/log/lynis.log)
  • Read security controls texts (https://cisofy.com)
  • Use --upload to upload data to central system (Lynis Enterprise users)

================================================================================

Lynis security scan details:

Hardening index : 77 [############### ]
Tests performed : 205
Plugins enabled : 1

Components:

  • Firewall [V]
  • Malware scanner [X]

Lynis Modules:

  • Compliance Status [?]
  • Security Audit [V]
  • Vulnerability Scan [V]

Files:

  • Test and debug information : /var/log/lynis.log
  • Report data : /var/log/lynis-report.dat

================================================================================
Notice: Lynis update available
Current version : 240 Latest version : 270

Lynis 2.4.0

Auditing, system hardening, and compliance for UNIX-based systems
(Linux, macOS, BSD, and others)

2007-2016, CISOfy - https://cisofy.com/lynis/
Enterprise support available (compliance, plugins, interface and tools)

================================================================================

[TIP]: Enhance Lynis audits by adding your settings to custom.prf (see /etc/lynis/default.prf for all settings)


#4

Known vulnerabilities in this system
CVE-2018-5740 bind9-host
CVE-2017-17087 vim-tiny (low urgency)
CVE-2018-10754 libncurses5 (remotely exploitable, low urgency)
CVE-2018-19217 libncurses5 (remotely exploitable, medium urgency)
CVE-2018-20406 python3.5
CVE-2017-12613 libapr1 (low urgency)
CVE-2018-17082 php7.2-mysql (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-mysql
CVE-2018-19935 php7.2-mysql (remotely exploitable, medium urgency)
CVE-2017-1000445 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-1000476 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-11531 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11532 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11534 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11539 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11644 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11724 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11751 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-11752 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12140 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12418 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12427 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12429 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12430 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12433 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12435 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12563 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12564 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12565 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12566 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12641 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12642 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12643 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12654 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12664 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12665 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12668 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12670 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12674 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12675 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12676 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-12691 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12692 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12693 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-12875 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-13061 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-13133 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-13146 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-13658 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-13768 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14060 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14172 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-14173 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14174 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-14175 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-14249 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14341 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-14400 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14505 imagemagick-6-common
(remotely exploitable, medium urgency)
CVE-2017-14528 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14532 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-14624 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-14625 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-14626 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-14739 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-14741 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-15015 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-15016 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-15017 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-15217 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-15281 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2017-17681 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-17682 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-17914 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-18209 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-18211 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-18252 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2017-18271 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2017-18273 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2018-10177 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-10804 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-10805 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-14551 imagemagick-6-common (remotely exploitable, high urgency)
CVE-2018-16643 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-16749 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-18024 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2018-18025 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-20467 imagemagick-6-common (low urgency)
CVE-2018-7443 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-8804 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2018-8960 imagemagick-6-common (remotely exploitable, low urgency)
CVE-2018-9133 imagemagick-6-common (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2-gd (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-gd
CVE-2018-19935 php7.2-gd (remotely exploitable, medium urgency)
CVE-2018-10754 ncurses-term (remotely exploitable, low urgency)
CVE-2018-19217 ncurses-term (remotely exploitable, medium urgency)
CVE-2018-10754 libtinfo5 (remotely exploitable, low urgency)
CVE-2018-19217 libtinfo5 (remotely exploitable, medium urgency)
CVE-2018-1049 libudev1 (remotely exploitable, medium urgency)
CVE-2018-15686 libudev1 (remotely exploitable, high urgency)
CVE-2018-16888 libudev1
CVE-2018-6954 libudev1 (high urgency)
CVE-2018-16869 libnettle6
CVE-2018-17082 php7.2-xml (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-xml
CVE-2018-19935 php7.2-xml (remotely exploitable, medium urgency)
CVE-2017-11462 libk5crypto3 (remotely exploitable, low urgency)
CVE-2018-20217 libk5crypto3 (low urgency)
CVE-2018-5710 libk5crypto3 (remotely exploitable, medium urgency)
CVE-2018-5729 libk5crypto3 (remotely exploitable, medium urgency)
CVE-2018-5730 libk5crypto3 (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2-fpm (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-fpm
CVE-2018-19935 php7.2-fpm (remotely exploitable, medium urgency)
CVE-2018-5740 libdns162
CVE-2018-20060 python-urllib3
CVE-2018-17082 php7.2-zip (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-zip
CVE-2018-19935 php7.2-zip (remotely exploitable, medium urgency)
CVE-2017-11671 gcc-4.8-base (low urgency)
CVE-2016-10517 redis-tools (remotely exploitable, medium urgency)
CVE-2018-6594 python-crypto (remotely exploitable, medium urgency)
CVE-2016-9112 libopenjp2-7 (remotely exploitable, medium urgency)
CVE-2017-17480 libopenjp2-7 (remotely exploitable, high urgency)
CVE-2018-14423 libopenjp2-7 (remotely exploitable, medium urgency)
CVE-2018-18088 libopenjp2-7 (remotely exploitable, medium urgency)
CVE-2018-5727 libopenjp2-7 (remotely exploitable, low urgency)
CVE-2018-5785 libopenjp2-7 (remotely exploitable, low urgency)
CVE-2018-6616 libopenjp2-7 (remotely exploitable, medium urgency)
CVE-2016-10228 libc6-dbg (remotely exploitable, medium urgency)
CVE-2017-1000408 libc6-dbg (high urgency)
CVE-2017-1000409 libc6-dbg (medium urgency)
CVE-2017-12132 libc6-dbg (remotely exploitable, medium urgency)
CVE-2017-15670 libc6-dbg (remotely exploitable, high urgency)
CVE-2017-15671 libc6-dbg (remotely exploitable, medium urgency)
CVE-2017-15804 libc6-dbg (remotely exploitable, low urgency)
CVE-2017-16997 libc6-dbg (remotely exploitable, high urgency)
CVE-2017-18269 libc6-dbg (remotely exploitable, high urgency)
CVE-2018-1000001 libc6-dbg (high urgency)
CVE-2018-11236 libc6-dbg (remotely exploitable, low urgency)
CVE-2018-11237 libc6-dbg (low urgency)
CVE-2018-6485 libc6-dbg (remotely exploitable, high urgency)
CVE-2018-6551 libc6-dbg (remotely exploitable, high urgency)
CVE-2018-1049 libpam-systemd (remotely exploitable, medium urgency)
CVE-2018-15686 libpam-systemd (remotely exploitable, high urgency)
CVE-2018-16888 libpam-systemd
CVE-2018-6954 libpam-systemd (high urgency)
CVE-2018-5740 libisc160
CVE-2018-17082 php7.2-common (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-common
CVE-2018-19935 php7.2-common (remotely exploitable, medium urgency)
CVE-2017-1000445 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-1000476 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-11531 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11532 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11534 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11539 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11644 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11724 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11751 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11752 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12140 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12418 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12427 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12429 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12430 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12433 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12435 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12563 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12564 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12565 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12566 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12641 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12642 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12643 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12654 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12664 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12665 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12668 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12670 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12674 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12675 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12676 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12691 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12692 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12693 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12875 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-13061 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13133 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-13146 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13658 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13768 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14060 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14172 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14173 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14174 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14175 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14249 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14341 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14400 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14505 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14528 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14532 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14624 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14625 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14626 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14739 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14741 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-15015 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-15016 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-15017 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-15217 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-15281 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-17681 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-17682 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-17914 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-18209 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18211 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18252 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18271 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-18273 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2018-10177 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-10804 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-10805 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-14551 libmagickcore-6.q16-3 (remotely exploitable, high urgency)
CVE-2018-16643 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-16749 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-18024 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-18025 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-20467 libmagickcore-6.q16-3 (low urgency)
CVE-2018-7443 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-8804 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-8960 libmagickcore-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-9133 libmagickcore-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-15232 libjpeg62-turbo (remotely exploitable, low urgency)
CVE-2018-1152 libjpeg62-turbo (remotely exploitable, low urgency)
CVE-2018-5740 libisc-export160
CVE-2018-1000168 libnghttp2-14 (remotely exploitable, low urgency)
CVE-2018-17082 php7.2-ldap (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-ldap
CVE-2018-19935 php7.2-ldap (remotely exploitable, medium urgen
cy)
CVE-2017-17087 xxd (low urgency)
CVE-2018-16384 modsecurity-crs (remotely exploitable, low urgency)
CVE-2018-16062 libdw1 (remotely exploitable, medium urgency)
CVE-2018-16402 libdw1 (remotely exploitable, low urgency)
CVE-2018-16403 libdw1 (remotely exploitable, low urgency)
CVE-2018-18310 libdw1 (remotely exploitable, medium urgency)
CVE-2018-18520 libdw1 (low urgency)
CVE-2018-18521 libdw1 (low urgency)
CVE-2018-14048 libpng16-16 (remotely exploitable, medium urgency)
CVE-2018-10754 libncursesw5 (remotely exploitable, low urgency)
CVE-2018-19217 libncursesw5 (remotely exploitable, medium urgency)
CVE-2017-12618 libaprutil1-dbd-sqlite3 (low urgency)
CVE-2018-1000807 python-openssl
CVE-2018-1000808 python-openssl (low urgency)
CVE-2016-2779 libuuid1 (high urgency)
CVE-2018-17082 php7.2-curl (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-curl
CVE-2018-19935 php7.2-curl (remotely exploitable, medium urgency)
CVE-2017-14107 libzip5 (remotely exploitable, medium urgency)
CVE-2016-2568 libpolkit-agent-1-0 (medium urgency)
CVE-2018-1116 libpolkit-agent-1-0 (low urgency)
CVE-2018-14048 libpng-tools (remotely exploitable, medium urgency)
CVE-2016-2568 policykit-1 (medium urgency)
CVE-2018-1116 policykit-1 (low urgency)
CVE-2018-20406 libpython3.5
CVE-2016-10228 multiarch-support (remotely exploitable, medium urgency)
CVE-2017-1000408 multiarch-support (high urgency)
CVE-2017-1000409 multiarch-support (medium urgency)
CVE-2017-12132 multiarch-support (remotely exploitable, medium urgency)
CVE-2017-15670 multiarch-support (remotely exploitable, high urgency)
CVE-2017-15671 multiarch-support (remotely exploitable, medium urgency)
CVE-2017-15804 multiarch-support (remotely exploitable, low urgency)
CVE-2017-16997 multiarch-support (remotely exploitable, high urgency)
CVE-2017-18269 multiarch-support (remotely exploitable, high urgency)
CVE-2018-1000001 multiarch-support (high urgency)
CVE-2018-11236 multiarch-support (remotely exploitable, low urgency)
CVE-2018-11237 multiarch-support (low urgency)
CVE-2018-6485 multiarch-support (remotely exploitable, high urgency)
CVE-2018-6551 multiarch-support (remotely exploitable, high urgency)
CVE-2018-1049 systemd-sysv (remotely exploitable, medium urgency)
CVE-2018-15686 systemd-sysv (remotely exploitable, high urgency)
CVE-2018-16888 systemd-sysv
CVE-2018-6954 systemd-sysv (high urgency)
CVE-2018-16062 libelf1 (remotely exploitable, medium urgency)
CVE-2018-16402 libelf1 (remotely exploitable, low urgency)
CVE-2018-16403 libelf1 (remotely exploitable, low urgency)
CVE-2018-18310 libelf1 (remotely exploitable, medium urgency)
CVE-2018-18520 libelf1 (low urgency)
CVE-2018-18521 libelf1 (low urgency)
CVE-2018-16428 libglib2.0-0 (remotely exploitable, low urgency)
CVE-2018-16429 libglib2.0-0 (remotely exploitable, low urgency)
CVE-2018-9234 gpgv (remotely exploitable, low urgency)
CVE-2018-20406 libpython3.5-stdlib
CVE-2018-5740 libisccfg140
CVE-2016-2779 bsdutils (high urgency)
CVE-2018-9234 gnupg (remotely exploitable, low urgency)
CVE-2018-1000035 unzip (remotely exploitable, medium urgency)
CVE-2016-10723 linux-libc-dev (medium urgency)
CVE-2016-8660 linux-libc-dev (low urgency)
CVE-2017-18232 linux-libc-dev (low urgency)
CVE-2017-18249 linux-libc-dev (medium urgency)
CVE-2017-18255 linux-libc-dev (medium urgency)
CVE-2017-5753 linux-libc-dev (medium urgency)
CVE-2018-1000026 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-1000204 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-10021 linux-libc-dev (medium urgency)
CVE-2018-10087 linux-libc-dev (low urgency)
CVE-2018-10124 linux-libc-dev (low urgency)
CVE-2018-10322 linux-libc-dev (medium urgency)
CVE-2018-10853 linux-libc-dev (medium urgency)
CVE-2018-10876 linux-libc-dev (medium urgency)
CVE-2018-10877 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-10878 linux-libc-dev (medium urgency)
CVE-2018-10879 linux-libc-dev (medium urgency)
CVE-2018-10880 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-10881 linux-libc-dev (medium urgency)
CVE-2018-10882 linux-libc-dev (medium urgency)
CVE-2018-10883 linux-libc-dev (medium urgency)
CVE-2018-10902 linux-libc-dev (medium urgency)
CVE-2018-10938 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-10940 linux-libc-dev (medium urgency)
CVE-2018-1108 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-1118 linux-libc-dev (low urgency)
CVE-2018-1120 linux-libc-dev (remotely exploitable, low urgency)
CVE-2018-1130 linux-libc-dev (medium urgency)
CVE-2018-11506 linux-libc-dev (high urgency)
CVE-2018-12233 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-12928 linux-libc-dev (medium urgency)
CVE-2018-13053 linux-libc-dev (low urgency)
CVE-2018-13094 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-13096 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-13099 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-13405 linux-libc-dev (medium urgency)
CVE-2018-14609 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-14617 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-14633 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-14678 linux-libc-dev (high urgency)
CVE-2018-14734 linux-libc-dev (medium urgency)
CVE-2018-15572 linux-libc-dev (low urgency)
CVE-2018-15594 linux-libc-dev (low urgency)
CVE-2018-16276 linux-libc-dev (high urgency)
CVE-2018-16658 linux-libc-dev (low urgency)
CVE-2018-17182 linux-libc-dev (high urgency)
CVE-2018-3620 linux-libc-dev (medium urgency)
CVE-2018-3639 linux-libc-dev (medium urgency)
CVE-2018-3646 linux-libc-dev (medium urgency)
CVE-2018-5390 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-5391 linux-libc-dev (remotely exploitable, high urgency)
CVE-2018-5814 linux-libc-dev (medium urgency)
CVE-2018-6412 linux-libc-dev (remotely exploitable, medium urgency)
CVE-2018-6554 linux-libc-dev (medium urgency)
CVE-2018-6555 linux-libc-dev (high urgency)
CVE-2018-7273 linux-libc-dev (medium urgency)
CVE-2018-7755 linux-libc-dev (low urgency)
CVE-2018-9363 linux-libc-dev (high urgency)
CVE-2018-9516 linux-libc-dev (high urgency)
CVE-2016-2779 mount (high urgency)
CVE-2018-16868 libgnutls30
CVE-2018-1049 libsystemd0 (remotely exploitable, medium urgency)
CVE-2018-15686 libsystemd0 (remotely exploitable, high urgency)
CVE-2018-16888 libsystemd0
CVE-2018-6954 libsystemd0 (high urgency)
CVE-2018-5740 libdns-export162
CVE-2016-10228 libc6 (remotely exploitable, medium urgency)
CVE-2017-1000408 libc6 (high urgency)
CVE-2017-1000409 libc6 (medium urgency)
CVE-2017-12132 libc6 (remotely exploitable, medium urgency)
CVE-2017-15670 libc6 (remotely exploitable, high urgency)
CVE-2017-15671 libc6 (remotely exploitable, medium urgency)
CVE-2017-15804 libc6 (remotely exploitable, low urgency)
CVE-2017-16997 libc6 (remotely exploitable, high urgency)
CVE-2017-18269 libc6 (remotely exploitable, high urgency)
CVE-2018-1000001 libc6 (high urgency)
CVE-2018-11236 libc6 (remotely exploitable, low urgency)
CVE-2018-11237 libc6 (low urgency)
CVE-2018-6485 libc6 (remotely exploitable, high urgency)
CVE-2018-6551 libc6 (remotely exploitable, high urgency)
CVE-2017-17942 libtiff5 (remotely exploitable, medium urgency)
CVE-2018-12900 libtiff5 (remotely exploitable, medium urgency)
CVE-2018-17000 libtiff5 (remotely exploitable, medium urgency)
CVE-2018-17100 libtiff5 (remotely exploitable, medium urgency)
CVE-2018-19210 libtiff5 (remotely exploitable, medium urgency)
CVE-2018-5360 libtiff5 (remotely exploitable, medium urgency)
CVE-2017-1000445 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-1000476 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-11531 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11532 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11534 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11539 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11644 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11724 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11751 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-11752 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12140 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12418 imagemagick-6.q16 (remotely exploitable, medium urgency)


#5

CVE-2017-12427 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12429 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12430 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12433 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12435 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12563 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12564 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12565 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12566 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12641 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12642 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12643 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12654 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12664 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12665 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12668 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12670 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12674 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12675 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12676 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-12691 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12692 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12693 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-12875 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-13061 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-13133 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-13146 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-13658 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-13768 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14060 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14172 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-14173 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14174 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-14175 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-14249 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14341 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-14400 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14505 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14528 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14532 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-14624 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-14625 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-14626 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-14739 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-14741 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-15015 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-15016 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-15017 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-15217 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-15281 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2017-17681 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-17682 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-17914 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-18209 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-18211 imagemagick
-6.q16 (remotely exploitable, low urgency)
CVE-2017-18252 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2017-18271 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2017-18273 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2018-10177 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-10804 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-10805 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-14551 imagemagick-6.q16 (remotely exploitable, high urgency)
CVE-2018-16643 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-16749 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-18024 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2018-18025 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-20467 imagemagick-6.q16 (low urgency)
CVE-2018-7443 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2018-8804 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2018-8960 imagemagick-6.q16 (remotely exploitable, low urgency)
CVE-2018-9133 imagemagick-6.q16 (remotely exploitable, medium urgency)
CVE-2016-2779 libfdisk1 (high urgency)
CVE-2018-5740 dnsutils
CVE-2016-2781 coreutils (low urgency)
CVE-2018-20482 tar
CVE-2017-11462 libkrb5support0 (remotely exploitable, low urgency)
CVE-2018-20217 libkrb5support0 (low urgency)
CVE-2018-5710 libkrb5support0 (remotely exploitable, medium urgency)
CVE-2018-5729 libkrb5support0 (remotely exploitable, medium urgency)
CVE-2018-5730 libkrb5support0 (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2-mbstring (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-mbstring
CVE-2018-19935 php7.2-mbstring (remotely exploitable, medium urgency)
CVE-2016-9318 libxml2 (remotely exploitable, medium urgency)
CVE-2017-16932 libxml2 (remotely exploitable, medium urgency)
CVE-2017-18258 libxml2 (remotely exploitable, medium urgency)
CVE-2017-5130 libxml2 (remotely exploitable, medium urgency)
CVE-2017-5969 libxml2 (remotely exploitable, low urgency)
CVE-2017-8872 libxml2 (remotely exploitable, medium urgency)
CVE-2018-14404 libxml2 (remotely exploitable, medium urgency)
CVE-2018-14567 libxml2 (remotely exploitable, medium urgency)
CVE-2016-2779 libblkid1 (high urgency)
CVE-2018-1000654 libtasn1-6 (remotely exploitable, high urgency)
CVE-2018-16869 libhogweed4
CVE-2018-5764 rsync (remotely exploitable, medium urgency)
CVE-2018-20406 python3.5-minimal
CVE-2017-11462 libgssapi-krb5-2 (remotely exploitable, low urgency)
CVE-2018-20217 libgssapi-krb5-2 (low urgency)
CVE-2018-5710 libgssapi-krb5-2 (remotely exploitable, medium urgency)
CVE-2018-5729 libgssapi-krb5-2 (remotely exploitable, medium urgency)
CVE-2018-5730 libgssapi-krb5-2 (remotely exploitable, medium urgency)
CVE-2016-4607 libxslt1.1 (remotely exploitable, high urgency)
CVE-2016-4608 libxslt1.1 (remotely exploitable, high urgency)
CVE-2016-4609 libxslt1.1 (remotely exploitable, high urgency)
CVE-2016-4610 libxslt1.1 (remotely exploitable, high urgency)
CVE-2017-2477 libxslt1.1 (remotely exploitable, high urgency)
CVE-2018-15919 ssh (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2-bz2 (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-bz2
CVE-2018-19935 php7.2-bz2 (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2-readline (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-readline
CVE-2018-19935 php7.2-readline (remotely exploitable, medium urgency)
CVE-2018-9234 gnupg2 (remotely exploitable, low urgency)
CVE-2018-5740 libisccc140
CVE-2018-16428 libglib2.0-data (remotely exploitable, low urgency)
CVE-2018-16429 libglib2.0-data (remotely exploitable, low urgency)
CVE-2017-13704 dnsmasq (remotely exploitable, medium urgency)
CVE-2017-14491 dnsmasq (remotely exploitable, high urgency)
CVE-2017-14492 dnsmasq (remotely exploitable, high urgency)
CVE-2017-14493 dnsmasq (remotely exploitable, high urgency)
CVE-2017-14494 dnsmasq (remotely exploitable, medium urgency)
CVE-2017-14495 dnsmasq (remotely exploitable, medium urgency)
CVE-2017-14496 dnsmasq (r
emotely exploitable, high urgency)
CVE-2017-15107 dnsmasq (remotely exploitable, medium urgency)
CVE-2017-12424 passwd (remotely exploitable, high urgency)
CVE-2018-7169 passwd (remotely exploitable, medium urgency)
CVE-2018-17082 php7.2 (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2
CVE-2018-19935 php7.2 (remotely exploitable, medium urgency)
CVE-2018-15919 openssh-server (remotely exploitable, medium urgency)
CVE-2016-2568 libpolkit-backend-1-0 (medium urgency)
CVE-2018-1116 libpolkit-backend-1-0 (low urgency)
CVE-2018-15919 openssh-sftp-server (remotely exploitable, medium urgency)
CVE-2018-10754 ncurses-base (remotely exploitable, low urgency)
CVE-2018-19217 ncurses-base (remotely exploitable, medium urgency)
CVE-2016-10228 libc-bin (remotely exploitable, medium urgency)
CVE-2017-1000408 libc-bin (high urgency)
CVE-2017-1000409 libc-bin (medium urgency)
CVE-2017-12132 libc-bin (remotely exploitable, medium urgency)
CVE-2017-15670 libc-bin (remotely exploitable, high urgency)
CVE-2017-15671 libc-bin (remotely exploitable, medium urgency)
CVE-2017-15804 libc-bin (remotely exploitable, low urgency)
CVE-2017-16997 libc-bin (remotely exploitable, high urgency)
CVE-2017-18269 libc-bin (remotely exploitable, high urgency)
CVE-2018-1000001 libc-bin (high urgency)
CVE-2018-11236 libc-bin (remotely exploitable, low urgency)
CVE-2018-11237 libc-bin (low urgency)
CVE-2018-6485 libc-bin (remotely exploitable, high urgency)
CVE-2018-6551 libc-bin (remotely exploitable, high urgency)
CVE-2018-1049 udev (remotely exploitable, medium urgency)
CVE-2018-15686 udev (remotely exploitable, high urgency)
CVE-2018-16888 udev
CVE-2018-6954 udev (high urgency)
CVE-2018-17082 php7.2-cli (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-cli
CVE-2018-19935 php7.2-cli (remotely exploitable, medium urgency)
CVE-2017-12618 libaprutil1 (low urgency)
CVE-2016-10228 libc-l10n (remotely exploitable, medium urgency)
CVE-2017-1000408 libc-l10n (high urgency)
CVE-2017-1000409 libc-l10n (medium urgency)
CVE-2017-12132 libc-l10n (remotely exploitable, medium urgency)
CVE-2017-15670 libc-l10n (remotely exploitable, high urgency)
CVE-2017-15671 libc-l10n (remotely exploitable, medium urgency)
CVE-2017-15804 libc-l10n (remotely exploitable, low urgency)
CVE-2017-16997 libc-l10n (remotely exploitable, high urgency)
CVE-2017-18269 libc-l10n (remotely exploitable, high urgency)
CVE-2018-1000001 libc-l10n (high urgency)
CVE-2018-11236 libc-l10n (remotely exploitable, low urgency)
CVE-2018-11237 libc-l10n (low urgency)
CVE-2018-6485 libc-l10n (remotely exploitable, high urgency)
CVE-2018-6551 libc-l10n (remotely exploitable, high urgency)
CVE-2018-1049 systemd (remotely exploitable, medium urgency)
CVE-2018-15686 systemd (remotely exploitable, high urgency)
CVE-2018-16888 systemd
CVE-2018-6954 systemd (high urgency)
CVE-2018-5740 liblwres141
CVE-2017-1000445 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-1000476 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-11531 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11532 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11534 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11539 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11644 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11724 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11751 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-11752 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12140 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12418 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12427 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12429 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12430 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12433 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12435 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12563 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12564 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12565 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12566 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12641 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12642 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12643 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12654 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12664 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12665 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12668 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12670 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12674 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12675 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12676 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-12691 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12692 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12693 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-12875 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-13061 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13133 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-13146 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13658 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-13768 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14060 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14172 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14173 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14174 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14175 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14249 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14341 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14400 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14505 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14528 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14532 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-14624 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14625 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14626 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-14739 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-14741 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-15015 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-15016 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-15017 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-15217 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-15281 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-17681 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-17682 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-17914 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-18209 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18211 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18252 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2017-18271 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2017-18273 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2018-10177 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-10804 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-10805 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-14551 libmagickwand-6.q16-3 (remotely exploitable, high urgency)
CVE-2018-16643 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-16749 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-18024 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-18025 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-20467 libmagickwand-6.q16-3 (low urgency)
CVE-2018-7443 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2018-8804 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-8960 libmagickwand-6.q16-3 (remotely exploitable, low urgency)
CVE-2018-9133 libmagickwand-6.q16-3 (remotely exploitable, medium urgency)
CVE-2017-17087 vim-common (low urgency)


#6

CVE-2018-20346 libsqlite3-0
CVE-2018-8740 libsqlite3-0 (remotely exploitable, medium urgency)
CVE-2017-1000445 imagemagick (remotely exploitable, medium urgency)
CVE-2017-1000476 imagemagick (remotely exploitable, high urgency)
CVE-2017-11531 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11532 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11534 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11539 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11644 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11724 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11751 imagemagick (remotely exploitable, medium urgency)
CVE-2017-11752 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12140 imagemagick (remotely exploitable, high urgency)
CVE-2017-12418 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12427 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12429 imagemagick (remotely exploitable, high urgency)
CVE-2017-12430 imagemagick (remotely exploitable, high urgency)
CVE-2017-12433 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12435 imagemagick (remotely exploitable, high urgency)
CVE-2017-12563 imagemagick (remotely exploitable, high urgency)
CVE-2017-12564 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12565 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12566 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12641 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12642 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12643 imagemagick (remotely exploitable, high urgency)
CVE-2017-12654 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12664 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12665 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12668 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12670 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12674 imagemagick (remotely exploitable, high urgency)
CVE-2017-12675 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12676 imagemagick (remotely exploitable, medium urgency)
CVE-2017-12691 imagemagick (remotely exploitable, high urgency)
CVE-2017-12692 imagemagick (remotely exploitable, high urgency)
CVE-2017-12693 imagemagick (remotely exploitable, high urgency)
CVE-2017-12875 imagemagick (remotely exploitable, high urgency)
CVE-2017-13061 imagemagick (remotely exploitable, medium urgency)
CVE-2017-13133 imagemagick (remotely exploitable, high urgency)
CVE-2017-13146 imagemagick (remotely exploitable, medium urgency)
CVE-2017-13658 imagemagick (remotely exploitable, medium urgency)
CVE-2017-13768 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14060 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14172 imagemagick (remotely exploitable, high urgency)
CVE-2017-14173 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14174 imagemagick (remotely exploitable, high urgency)
CVE-2017-14175 imagemagick (remotely exploitable, high urgency)
CVE-2017-14249 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14341 imagemagick (remotely exploitable, high urgency)
CVE-2017-14400 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14505 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14528 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14532 imagemagick (remotely exploitable, high urgency)
CVE-2017-14624 imagemagick (remotely exploitable, low urgency)
CVE-2017-14625 imagemagick (remotely exploitable, low urgency)
CVE-2017-14626 imagemagick (remotely exploitable, low urgency)
CVE-2017-14739 imagemagick (remotely exploitable, medium urgency)
CVE-2017-14741 imagemagick (remotely exploitable, medium urgency)
CVE-2017-15015 imagemagick (remotely exploitable, low urgency)
CVE-2017-15016 imagemagick (remotely exploitable, high urgency)
CVE-2017-15017 imagemagick (remotely exploitable, high urgency)
CVE-2017-15217 imagemagick (remotely exploitable, medium urgency)
CVE-2017-15281 imagemagick (remotely exploitable, medium urgency)
CVE-2017-17681 imagemagick (remotely exploitable, low urgency)
CVE-2017-17682 imagemagick (remotely exploitable, high urgency)
CVE-2017-17914 imagemagick (remotely exploitable, high urgency)
CVE-2017-18209 imagemagick (remotely exploitable, low urgency)
CVE-2017-18211 imagemagick (remotely exploitable, low urgency)
CVE-2017-18252 imagemagick (remotely exploitable, low urgency)
CVE-2017-18271 imagemagick (remotely exploitable, high urgency)
CVE-2017-18273 imagemagick (remotely exploitable, high urgency)
CVE-2018-10177 imagemagick (remotely exploitable, medium urgency)
CVE-2018-10804 imagemagick (remotely exploitable, medium urgency)
CVE-2018-10805 imagemagick (remotely exploitable, medium urgency)
CVE-2018-14551 imagemagick (remotely exploitable, high urgency)
CVE-2018-16643 imagemagick (remotely exploitable, medium urgency)
CVE-2018-16749 imagemagick (remotely exploitable, medium urgency)
CVE-2018-18024 imagemagick (remotely exploitable, low urgency)
CVE-2018-18025 imagemagick (remotely exploitable, medium urgency)
CVE-2018-20467 imagemagick (low urgency)
CVE-2018-7443 imagemagick (remotely exploitable, medium urgency)
CVE-2018-8804 imagemagick (remotely exploitable, low urgency)
CVE-2018-8960 imagemagick (remotely exploitable, low urgency)
CVE-2018-9133 imagemagick (remotely exploitable, medium urgency)
CVE-2018-18074 python3-requests (remotely exploitable, low urgency)
CVE-2017-13704 dnsmasq-base (remotely exploitable, medium urgency)
CVE-2017-14491 dnsmasq-base (remotely exploitable, high urgency)
CVE-2017-14492 dnsmasq-base (remotely exploitable, high urgency)
CVE-2017-14493 dnsmasq-base (remotely exploitable, high urgency)
CVE-2017-14494 dnsmasq-base (remotely exploitable, medium urgency)
CVE-2017-14495 dnsmasq-base (remotely exploitable, medium urgency)
CVE-2017-14496 dnsmasq-base (remotely exploitable, high urgency)
CVE-2017-15107 dnsmasq-base (remotely exploitable, medium urgency)
CVE-2018-18074 python-requests (remotely exploitable, low urgency)
CVE-2018-17082 php7.2-json (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-json
CVE-2018-19935 php7.2-json (remotely exploitable, medium urgency)
CVE-2018-20060 python3-urllib3
CVE-2018-17082 php7.2-intl (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-intl
CVE-2018-19935 php7.2-intl (remotely exploitable, medium urgency)
CVE-2017-11462 libkrb5-3 (remotely exploitable, low urgency)
CVE-2018-20217 libkrb5-3 (low urgency)
CVE-2018-5710 libkrb5-3 (remotely exploitable, medium urgency)
CVE-2018-5729 libkrb5-3 (remotely exploitable, medium urgency)
CVE-2018-5730 libkrb5-3 (remotely exploitable, medium urgency)
CVE-2017-11671 gcc-4.9-base (low urgency)
CVE-2017-12448 binutils (remotely exploitable, medium urgency)
CVE-2017-12449 binutils (remotely exploitable, medium urgency)
CVE-2017-12450 binutils (remotely exploitable, medium urgency)
CVE-2017-12451 binutils (remotely exploitable, medium urgency)
CVE-2017-12452 binutils (remotely exploitable, medium urgency)
CVE-2017-12453 binutils (remotely exploitable, medium urgency)
CVE-2017-12454 binutils (remotely exploitable, medium urgency)
CVE-2017-12455 binutils (remotely exploitable, medium urgency)
CVE-2017-12456 binutils (remotely exploitable, medium urgency)
CVE-2017-12457 binutils (remotely exploitable, medium urgency)
CVE-2017-12458 binutils (remotely exploitable, medium urgency)
CVE-2017-12459 binutils (remotely exploitable, medium urgency)
CVE-2017-12799 binutils (remotely exploitable, medium urgency)
CVE-2017-12967 binutils (remotely exploitable, medium urgency)
CVE-2017-13710 binutils (remotely exploitable, medium urgency)
CVE-2017-13716 binutils (remotely exploitable, low urgency)
CVE-2017-13757 binutils (remotely exploitable, medium urgency)
CVE-2017-14128 binutils (remotely exploitable, low urgency)
CVE-2017-14129 binutils (remotely exploitable, low urgency)
CVE-2017-14130 binutils (remotely exploitable, low urgency)
CVE-2017-14333 binutils (remotely exploitable, medium urgency)
CVE-2017-14529 binutils (remotely exploitable, medium urgency)
CVE-2017-14729 binutils (remotely exploitable, medium urgency)
CVE-2017-14745 binutils (remotely exploitable, medium urgency)
CVE-2017-14930 binutils (remotely exploitable, high urgency)
CVE-2017-14932 binutils (remotely exploitable, medium urgency)
CVE-2017-14933 binutils (remotely exploitable, medium urgency)
CVE-2017-14934 binutils (remotely exploitable, medium urgency)
CVE-2017-14938 binutils (remotely exploitable, medium urgency)
CVE-2017-14939 binutils (remotely exploitable, medium urgency)
CVE-2017-14940 binutils (remotely exploitable, medium urgency)
CVE-2017-14974 binutils (remotely exploitable, medium urgency)
CVE-2017-15020 binutils (remotely exploitable, medium urgency)
CVE-2017-15021 binutils (remotely exploitable, medium urgency)
CVE-2017-15022 binutils (remotely exploitable, medium urgency)
CVE-2017-15023 binutils (remotely exploitable, medium urgency)
CVE-2017-15024 binutils (remotely exploitable, medium urgency)
CVE-2017-15025 binutils (remotely exploitable, medium urgency)
CVE-2017-15225 binutils (remotely exploitable, medium urgency)
CVE-2017-15938 binutils (remotely exploitable, medium urgency)
CVE-2017-15996 binutils (remotely exploitable, medium urgency)
CVE-2017-16826 binutils (remotely exploitable, medium urgency)
CVE-2017-16827 binutils (remotely exploitable, medium urgency)
CVE-2017-16828 binutils (remotely exploitable, medium urgency)
CVE-2017-16829 binutils (remotely exploitable, medium urgency)
CVE-2017-16830 binutils (remotely exploitable, medium urgency)
CVE-2017-16831 binutils (remotely exploitable, medium urgency)
CVE-2017-16832 binutils (remotely exploitable, medium urgency)
CVE-2017-17080 binutils (remotely exploitable, medium urgency)
CVE-2017-17121 binutils (remotely exploitable, medium urgency)
CVE-2017-17122 binutils (remotely exploitable, medium urgency)
CVE-2017-17123 binutils (remotely exploitable, medium urgency)
CVE-2017-17124 binutils (remotely exploitable, medium urgency)
CVE-2017-17125 binutils (remotely exploitable, medium urgency)
CVE-2017-17126 binutils (remotely exploitable, medium urgency)
CVE-2017-9038 binutils (remotely exploitable, low urgency)
CVE-2017-9039 binutils (remotely exploitable, low urgency)
CVE-2017-9040 binutils (remotely exploitable, low urgency)
CVE-2017-9041 binutils (remotely exploitable, low urgency)
CVE-2017-9042 binutils (remotely exploitable, low urgency)
CVE-2017-9043 binutils (remotely exploitable, low urgency)
CVE-2017-9044 binutils (remotely exploitable, low urgency)
CVE-2017-9742 binutils (remotely exploitable, low urgency)
CVE-2017-9743 binutils (remotely exploitable, low urgency)
CVE-2017-9744 binutils (remotely exploitable, low urgency)
CVE-2017-9745 binutils (remotely exploitable, low urgency)
CVE-2017-9746 binutils (remotely exploitable, low urgency)
CVE-2017-9747 binutils (remotely exploitable, low urgency)
CVE-2017-9748 binutils (remotely exploitable, low urgency)
CVE-2017-9749 binutils (remotely exploitable, low urgency)
CVE-2017-9750 binutils (remotely exploitable, low urgency)
CVE-2017-9751 binutils (remotely exploitable, low urgency)
CVE-2017-9752 binutils (remotely exploitable, low urgency)
CVE-2017-9753 binutils (remotely exploitable,
s (remotely exploitable, medium urgency)
CVE-2017-12456 binutils (remotely exploitable, medium urgency)
CVE-2017-12457 binutils (remotely exploitable, medium urgency)
CVE-2017-12458 binutils (remotely exploitable, medium urgency)
CVE-2017-12459 binutils (remotely exploitable, medium urgency)
CVE-2017-12799 binutils (remotely exploitable, medium urgency)
CVE-2017-12967 binutils (remotely exploitable, medium urgency)
CVE-2017-13710 binutils (remotely exploitable, medium urgency)
CVE-2017-13716 binutils (remotely exploitable, low urgency)
CVE-2017-13757 binutils (remotely exploitable, medium urgency)
CVE-2017-14128 binutils (remotely exploitable, low urgency)
CVE-2017-14129 binutils (remotely exploitable, low urgency)
CVE-2017-14130 binutils (remotely exploitable, low urgency)
CVE-2017-14333 binutils (remotely exploitable, medium urgency)
CVE-2017-14529 binutils (remotely exploitable, medium urgency)
CVE-2017-14729 binutils (remotely exploitable, medium urgency)
CVE-2017-14745 binutils (remotely exploitable, medium urgency)
CVE-2017-14930 binutils (remotely exploitable, high urgency)
CVE-2017-14932 binutils (remotely exploitable, medium urgency)
CVE-2017-14933 binutils (remotely exploitable, medium urgency)
CVE-2017-14934 binutils (remotely exploitable, medium urgency)
CVE-2017-14938 binutils (remotely exploitable, medium urgency)
CVE-2017-14939 binutils (remotely exploitable, medium urgency)
CVE-2017-14940 binutils (remotely exploitable, medium urgency)
CVE-2017-14974 binutils (remotely exploitable, medium urgency)
CVE-2017-15020 binutils (remotely exploitable, medium urgency)
CVE-2017-15021 binutils (remotely exploitable, medium urgency)
CVE-2017-15022 binutils (remotely exploitable, medium urgency)
CVE-2017-15023 binutils (remotely exploitable, medium urgency)
CVE-2017-15024 binutils (remotely exploitable, medium urgency)
CVE-2017-15025 binutils (remotely exploitable, medium urgency)
CVE-2017-15225 binutils (remotely exploitable, medium urgency)
CVE-2017-15938 binutils (remotely exploitable, medium urgency)
CVE-2017-15996 binutils (remotely exploitable, medium urgency)
CVE-2017-16826 binutils (remotely exploitable, medium urgency)
CVE-2017-16827 binutils (remotely exploitable, medium urgency)
CVE-2017-16828 binutils (remotely exploitable, medium urgency)
CVE-2017-16829 binutils (remotely exploitable, medium urgency)
CVE-2017-16830 binutils (remotely exploitable, medium urgency)
CVE-2017-16831 binutils (remotely exploitable, medium urgency)
CVE-2017-16832 binutils (remotely exploitable, medium urgency)
CVE-2017-17080 binutils (remotely exploitable, medium urgency)
CVE-2017-17121 binutils (remotely exploitable, medium urgency)
CVE-2017-17122 binutils (remotely exploitable, medium urgency)
CVE-2017-17123 binutils (remotely exploitable, medium urgency)
CVE-2017-17124 binutils (remotely exploitable, medium urgency)
CVE-2017-17125 binutils (remotely exploitable, medium urgency)
CVE-2017-17126 binutils (remotely exploitable, medium urgency)
CVE-2017-9038 binutils (remotely exploitable, low urgency)
CVE-2017-9039 binutils (remotely exploitable, low urgency)
CVE-2017-9040 binutils (remotely exploitable, low urgency)
CVE-2017-9041 binutils (remotely exploitable, low urgency)
CVE-2017-9042 binutils (remotely exploitable, low urgency)
CVE-2017-9043 binutils (remotely exploitable, low urgency)
CVE-2017-9044 binutils (remotely exploitable, low urgency)
CVE-2017-9742 binutils (remotely exploitable, low urgency)
CVE-2017-9743 binutils (remotely exploitable, low urgency)
CVE-2017-9744 binutils (remotely exploitable, low urgency)
CVE-2017-9745 binutils (remotely exploitable, low urgency)
CVE-2017-9746 binutils (remotely exploitable, low urgency)
CVE-2017-9747 binutils (remotely exploitable, low urgency)
CVE-2017-9748 binutils (remotely exploitable, low urgency)
CVE-2017-9749 binutils (remotely exploitable, low urgency)
CVE-2017-9750 binutils (remotely exploitable, low urgency)
CVE-2017-9751 binutils (remotely exploitable, low urgency)
CVE-2017-9752 binutils (remotely exploitable, low urgency)
CVE-2017-9753 binutils (remotely exploitable,
low urgency)
CVE-2017-9754 binutils (remotely exploitable, low urgency)
CVE-2017-9755 binutils (remotely exploitable, low urgency)
CVE-2017-9756 binutils (remotely exploitable, low urgency)
CVE-2017-9954 binutils (remotely exploitable, medium urgency)
CVE-2017-9955 binutils (remotely exploitable, medium urgency)
CVE-2018-1000876 binutils
CVE-2018-10372 binutils (remotely exploitable, medium urgency)
CVE-2018-10373 binutils (remotely exploitable, medium urgency)
CVE-2018-10534 binutils (remotely exploitable, medium urgency)
CVE-2018-10535 binutils (remotely exploitable, medium urgency)
CVE-2018-12641 binutils (remotely exploitable, low urgency)
CVE-2018-12697 binutils (remotely exploitable, low urgency)
CVE-2018-12698 binutils (remotely exploitable, low urgency)
CVE-2018-12699 binutils (remotely exploitable, low urgency)
CVE-2018-12700 binutils (remotely exploitable, low urgency)
CVE-2018-12934 binutils (remotely exploitable, low urgency)
CVE-2018-13033 binutils (remotely exploitable, low urgency)
CVE-2018-17358 binutils (remotely exploitable, medium urgency)
CVE-2018-17359 binutils (remotely exploitable, medium urgency)
CVE-2018-17360 binutils (remotely exploitable, medium urgency)
CVE-2018-17794 binutils (remotely exploitable, low urgency)
CVE-2018-17985 binutils (remotely exploitable, medium urgency)
CVE-2018-18309 binutils
CVE-2018-18483 binutils (remotely exploitable, medium urgency)
CVE-2018-18484 binutils (remotely exploitable, medium urgency)
CVE-2018-18605 binutils (remotely exploitable, medium urgency)
CVE-2018-18606 binutils (remotely exploitable, medium urgency)
CVE-2018-18607 binutils (remotely exploitable, medium urgency)
CVE-2018-18700 binutils (remotely exploitable, medium urgency)
CVE-2018-18701 binutils (remotely exploitable, medium urgency)
CVE-2018-19931 binutils (remotely exploitable, medium urgency)
CVE-2018-19932 binutils (remotely exploitable, medium urgency)
CVE-2018-20002 binutils (remotely exploitable, medium urgency)
CVE-2018-20623 binutils
CVE-2018-20651 binutils
CVE-2018-20657 binutils (low urgency)
CVE-2018-20671 binutils
CVE-2018-20673 binutils
CVE-2018-6323 binutils (remotely exploitable, medium urgency)
CVE-2018-6543 binutils (remotely exploitable, medium urgency)
CVE-2018-6759 binutils (remotely exploitable, medium urgency)
CVE-2018-6872 binutils (remotely exploitable, medium urgency)
CVE-2018-7208 binutils (remotely exploitable, medium urgency)
CVE-2018-7568 binutils (remotely exploitable, medium urgency)
CVE-2018-7569 binutils (remotely exploitable, medium urgency)
CVE-2018-7570 binutils (remotely exploitable, medium urgency)
CVE-2018-7642 binutils (remotely exploitable, medium urgency)
CVE-2018-7643 binutils (remotely exploitable, medium urgency)
CVE-2018-8945 binutils (remotely exploitable, low urgency)
CVE-2018-9138 binutils (remotely exploitable, low urgency)
CVE-2018-9996 binutils (remotely exploitable, low urgency)
CVE-2016-10228 libc-dev-bin (remotely exploitable, medium urgency)
CVE-2017-1000408 libc-dev-bin (high urgency)
CVE-2017-1000409 libc-dev-bin (medium urgency)
CVE-2017-12132 libc-dev-bin (remotely exploitable, medium urgency)
CVE-2017-15670 libc-dev-bin (remotely exploitable, high urgency)
CVE-2017-15671 libc-dev-bin (remotely exploitable, medium urgency)
CVE-2017-15804 libc-dev-bin (remotely exploitable, low urgency)
CVE-2017-16997 libc-dev-bin (remotely exploitable, high urgency)
CVE-2017-18269 libc-dev-bin (remotely exploitable, high urgency)
CVE-2018-1000001 libc-dev-bin (high urgency)
CVE-2018-11236 libc-dev-bin (remotely exploitable, low urgency)
CVE-2018-11237 libc-dev-bin (low urgency)
CVE-2018-6485 libc-dev-bin (remotely exploitable, high urgency)
CVE-2018-6551 libc-dev-bin (remotely exploitable, high urgency)
CVE-2018-14048 libpng-dev (remotely exploitable, medium urgency)
CVE-2018-5740 libbind9-140
CVE-2016-2779 libmount1 (high urgency)
CVE-2017-12424 login (remotely exploitable, high urgency)
CVE-2018-7169 login (remotely exploitable, medium urgency)
CVE-2018-9234 gnupg-agent (remotely exploitable, low urgency)
CVE-2017-7697 libsamplerate0 (remotely exploit
able, medium urgency)
CVE-2002-2439 gcc-4.7-base (low urgency)
CVE-2014-5044 gcc-4.7-base (remotely exploitable, high urgency)
CVE-2017-11671 gcc-4.7-base (low urgency)
CVE-2002-2439 gcc-4.6-base (low urgency)
CVE-2014-5044 gcc-4.6-base (remotely exploitable, high urgency)
CVE-2017-11671 gcc-4.6-base (low urgency)
CVE-2018-15919 openssh-client (remotely exploitable, medium urgency)
CVE-2018-10754 ncurses-bin (remotely exploitable, low urgency)
CVE-2018-19217 ncurses-bin (remotely exploitable, medium urgency)
CVE-2018-9234 dirmngr (remotely exploitable, low urgency)
CVE-2016-9797 bluez (remotely exploitable, medium urgency)
CVE-2016-9798 bluez (remotely exploitable, medium urgency)
CVE-2016-9799 bluez (remotely exploitable, medium urgency)
CVE-2016-9800 bluez (remotely exploitable, medium urgency)
CVE-2016-9801 bluez (remotely exploitable, medium urgency)
CVE-2016-9802 bluez (remotely exploitable, medium urgency)
CVE-2016-9803 bluez (remotely exploitable, medium urgency)
CVE-2016-9804 bluez (remotely exploitable, medium urgency)
CVE-2016-9917 bluez (remotely exploitable, medium urgency)
CVE-2016-9918 bluez (remotely exploitable, medium urgency)
CVE-2017-1000250 bluez (remotely exploitable, low urgency)
CVE-2018-10910 bluez
CVE-2016-10228 libc6-dev (remotely exploitable, medium urgency)
CVE-2017-1000408 libc6-dev (high urgency)
CVE-2017-1000409 libc6-dev (medium urgency)
CVE-2017-12132 libc6-dev (remotely exploitable, medium urgency)
CVE-2017-15670 libc6-dev (remotely exploitable, high urgency)
CVE-2017-15671 libc6-dev (remotely exploitable, medium urgency)
CVE-2017-15804 libc6-dev (remotely exploitable, low urgency)
CVE-2017-16997 libc6-dev (remotely exploitable, high urgency)
CVE-2017-18269 libc6-dev (remotely exploitable, high urgency)
CVE-2018-1000001 libc6-dev (high urgency)
CVE-2018-11236 libc6-dev (remotely exploitable, low urgency)
CVE-2018-11237 libc6-dev (low urgency)
CVE-2018-6485 libc6-dev (remotely exploitable, high urgency)
CVE-2018-6551 libc6-dev (remotely exploitable, high urgency)
CVE-2016-10517 redis-server (remotely exploitable, medium urgency)
CVE-2017-9525 cron (medium urgency)
CVE-2016-10228 locales (remotely exploitable, medium urgency)
CVE-2017-1000408 locales (high urgency)
CVE-2017-1000409 locales (medium urgency)
CVE-2017-12132 locales (remotely exploitable, medium urgency)
CVE-2017-15670 locales (remotely exploitable, high urgency)
CVE-2017-15671 locales (remotely exploitable, medium urgency)
CVE-2017-15804 locales (remotely exploitable, low urgency)
CVE-2017-16997 locales (remotely exploitable, high urgency)
CVE-2017-18269 locales (remotely exploitable, high urgency)
CVE-2018-1000001 locales (high urgency)
CVE-2018-11236 locales (remotely exploitable, low urgency)
CVE-2018-11237 locales (low urgency)
CVE-2018-6485 locales (remotely exploitable, high urgency)
CVE-2018-6551 locales (remotely exploitable, high urgency)
CVE-2017-14062 libidn11 (remotely exploitable, high urgency)
CVE-2016-2568 libpolkit-gobject-1-0 (medium urgency)
CVE-2018-1116 libpolkit-gobject-1-0 (low urgency)
CVE-2016-2779 util-linux (high urgency)
CVE-2017-11671 gcc-5-base (low urgency)
CVE-2018-20406 libpython3.5-minimal
CVE-2017-18248 libcups2 (remotely exploitable, low urgency)
CVE-2018-4700 libcups2
CVE-2016-2779 libsmartcols1 (high urgency)
CVE-2018-17082 php7.2-opcache (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2-opcache
CVE-2018-19935 php7.2-opcache (remotely exploitable, medium urgency)
CVE-2017-12618 libaprutil1-ldap (low urgency)


#7

Hi,

I’m really wondering about all of this. Do you have sources which state, that DietPi will not have these vulnerabilities? You seem to blame Nextcloud for this, but none of these exploitable libraries/ binaries are code from Nextcloud.
I mean, come on:
CVE-2018-16888 systemd
CVE-2018-6954 systemd (high urgency)
CVE-2018-15919 ssh (remotely exploitable, medium urgency)
CVE-2018-19518 php7.2

The highest number of vulnerabilities are obviously in imagemagick which is added for some smaller features and there are discussions about removing it. I think it is no longer used in the snap image and in the NC VM. Not sure if is already or will be dropped in ncp (@nachoparker?).
I think with DietPi you might only have a chance if its image uses more up-to-date packages. I suggest you check that first.

But apart from the raspi image, you should be aware that Nextcloud puts more effort in security than owncloud and additionally provides more security features. I consider Nextcloud more secure.
It’s your choice of course.


#8

It can be scary to look at the output of lynis.

I used it to greatly improve security and I got a score of 85-90 which is pretty good, but you have to understand that any system you are going to install has open CVEs. The most critical ones are patched by Debian and automatically installed by NCP when they are available.

This is not Nextcloud’s fault, all those issues come from Debian (unless there’s some misconfiguration but I already checked those out) and they are aware of them, so they are most likely not exploitable easily. In any case it is always good to aim for perfection.

I am saying this because Owncloud and any other Debian based system is going to be in the same situation, don’t disregard NCP as insecure as there’s a lot of security features backed in, including a WAF, firewall and so on.

If want to share any suggestions to improve the score that would be appreciated. I added lynis to NCP in order to make people aware that security is important and in order to get some help from users as well.


#9

allow me to disagree. In any case, help is welcome if you can think of improvements


#10

81% of Company Data Breaches Due to Poor Passwords:

I would suggest that caring about 2FA is the most productive measure to improve security (both for Nextcloud web login, AND SSH login to the Nextcloud server, thus securing the “front doors” to the server the best you can).

I would further suggest that PEBKAC (Problem Exists Between Keyboard And Chair; namely, your Nextcloud users using bad passwords when given a chance) is actually the larger, more likely to occur problem needing addressing.

One last thing, FWIW, I always at least install fail2ban on any Debian server I create in the cloud, BTW, which is a quick, easy thing to do (much simpler than setting up 2FA for SSH).


#11

Secure SSH by using keys instead of passwords
Disable root for most things
Harden debian
Harden apache2
Harden Mysql
Change apache2 config so that it does not show the version you’re using.
Install a bunch of things lynis comes up with.
2fa for weblogin is a good idea.
And requiring strong passwords


#12

Secure SSH by using keys instead of passwords
Disable root for most things
Harden debian
Harden apache2
Harden Mysql
Change apache2 config so that it does not show the version you’re using.
Install a bunch of things lynis comes up with.
2fa for weblogin is a good idea.
And requiring strong passwords

It’s all required before going online.
You can disagree. But if you use it for sensitive info then that’s not a very smart move.

Do you by any change know how to encrypt everything? The end-to-end encryption app gives a warning not to use it on important files. And on the ncp side there’s something similar mentioned.

I read about formatting an usb stick, encrypting it and then you can use it with nextcloudpi
Also the sd can be encrypted before installing the image.
But I’ve already installed everything so it’s too late for that. Now I’m wondering how I can manually encrypt everything, while not locking myself out of booting.

Oh, and there is software which can disable startup programs. Like printer stuff which you don’t need. It makes your pi just a bit faster. And you run less software and use less ports.

Firewalls can be bypassed so I wouldn’t rely on them too much.


#13

SSH, apache2 and mysql are already hardened. ncp-web is not available from outside your LAN. You can enable 2fa in Nextcloud by all means. UFW only opens exactly five ports, and there’s automatic Debian security upgrades. I am not sure what you are talking about.

If you have more ideas to improve, please send me a PR, that would be great but an unespecific list is not of much help sorry. Keep in mind that I do this for free in my free time so I can only do so much.

If you don’t trust NCP by all means don’t use it. This thread is turning toxic so I will now unsuscribe.

Cheers