⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.1
Server IP:
185.238.29.86
Server:
Linux server2 6.8.12-6-pve #1 SMP PREEMPT_DYNAMIC PMX 6.8.12-6 (2024-12-19T19:05Z) x86_64
Server Software:
nginx/1.18.0
PHP Version:
8.1.31
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
var
/
run
/
ubuntu-advantage
/
Edit File: aptnews.json
{ "messages": [ { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["xenial"], "packages": [ ["libfreetype6", "<", "2.6.1-0.1ubuntu2.5+esm2"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["bionic"], "packages": [ ["libfreetype6", "<", "2.8.1-2ubuntu2.2+esm1"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["focal"], "packages": [ ["libfreetype6", "<", "2.10.1-2ubuntu0.4"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["jammy"], "packages": [ ["libfreetype6", "<", "2.11.1+dfsg-1ubuntu0.3"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] } ] }
Simpan