Nessus Report

Report generated by Tenable Nessus™

Advanced_Scan_192.168.6.11

Sat, 09 Aug 2025 17:27:18 PDT

TABLE OF CONTENTS
Vulnerabilities by HostExpand All | Collapse All
192.168.6.11
1
5
13
3
142
Critical
High
Medium
Low
Info
Scan Information
Start time: Sat Aug 9 17:08:09 2025
End time: Sat Aug 9 17:27:17 2025
Host Information
Netbios Name: DEBIAN
IP: 192.168.6.11
MAC Address: BC:24:11:B5:F9:4A E6:AC:88:E0:BE:66 7E:FF:B7:BF:F3:CC AA:FA:9E:78:03:EF
OS: Linux Kernel 6.1.0-29-amd64
Vulnerabilities

100634 - Redis Server Unprotected by Password Authentication
-
Synopsis
A Redis server is not protected by password authentication.
Description
The Redis server running on the remote host is not protected by password authentication. A remote attacker can exploit this to gain unauthorized access to the server.
See Also
Solution
Enable the 'requirepass' directive in the redis.conf configuration file.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Plugin Information
Published: 2017/06/06, Modified: 2022/04/11
Plugin Output

tcp/6379/redis_server


An unauthenticated INFO request to the Redis Server returned the following:


# Server
redis_version:7.0.15
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:5f65bccf5d6cab79
redis_mode:standalone
os:Linux 6.1.0-29-amd64 x86_64
arch_bits:64
monotonic_clock:POSIX clock_gettime
multiplexing_api:epoll
atomicvar_api:c11-builtin
gcc_version:12.2.0
process_id:570
process_supervised:systemd
run_id:fd301a59efd41891c09ef04a6cadafc5b353006d
tcp_port:6379
server_time_usec:1754784590636820
uptime_in_seconds:7321
uptime_in_days:0
hz:10
configured_hz:10
lru_clock:9954126
executable:/usr/bin/redis-server
config_file:/etc/redis/redis.conf
io_threads_active:0

# Clients
connected_clients:1
cluster_connections:0
maxclients:10000
client_recent_max_input_buffer:20480
client_recent_max_output_buffer:0
blocked_clients:0
tracking_clients:0
clients_in_timeout_table:0

# Memory
used_memory:917808
used_memory_human:896.30K
used_memory_rss:3166208
used_memory_rss_human:3.02M
used_memory_peak:917808
used_memory_peak_human:896.30K
used_memory_peak_perc:100.28%
used_memory_overhead:876496
used_memory_startup:876136
used_memory_dataset:41312
used_memory_dataset_perc:99.14%
allocator_allocated:1786160
allocator_active:2088960
allocator_resident:4517888
total_system_memory:474296320
total_system_memory_human:452.32M
used_memory_lua:31744
used_memory_vm_eval:31744
used_memory_lua_human:31.00K
used_memory_scripts_eval:0
number_of_cached_scripts:0
number_of_functions:0
number_of_libraries:0
used_memory_vm_functions:32768
used_memory_vm_total:64512
used_memory_vm_total_human:63.00K
used_memory_functions:200
used_memory_scripts:200
used_memory_scripts_human:200B
maxmemory:0
maxmemory_human:0B
maxmemory_policy:noeviction
allocator_frag_ratio:1.17
allocator_frag_bytes:302800
allocator_rss_ratio:2.16
allocator_rss_bytes:2428928
rss_overhead_ratio:0.70
rss_overhead_bytes:-1351680
mem_fragmentation_ratio:3.61
mem_fragmentation_bytes:2288992
mem_not_counted_for_evict:8
mem_replication_backlog:0
mem_total_replication_buffers:0
mem_clients_slaves:0
mem_clients_normal:0
mem_cluster_links:0
mem_aof_buffer:8
mem_allocator:jemalloc-5.3.0
active_defrag_running:0
lazyfree_pending_objects:0
lazyfreed_objects:0

# Persistence
loading:0
async_loading:0
current_cow_peak:0
current_cow_size:0
current_cow_size_age:0
current_fork_perc:0.00
current_save_keys_processed:0
current_save_keys_total:0
rdb_changes_since_last_save:0
rdb_bgsave_in_progress:0
rdb_last_save_time:1754780870
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
rdb_saves:1
rdb_last_cow_size:540672
rdb_last_load_keys_expired:0
rdb_last_load_keys_loaded:0
aof_enabled:1
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_rewrites:0
aof_rewrites_consecutive_failures:0
aof_last_write_status:ok
aof_last_cow_size:0
module_fork_in_progress:0
module_fork_last_cow_size:0
aof_current_size:688
aof_base_size:89
aof_pending_rewrite:0
aof_buffer_length:0
aof_pending_bio_fsync:0
aof_delayed_fsync:0

# Stats
total_connections_received:12
total_commands_processed:0
instantaneous_ops_per_sec:0
total_net_input_bytes:2713
total_net_output_bytes:50
total_net_repl_input_bytes:0
total_net_repl_output_bytes:0
instantaneous_input_kbps:0.01
instantaneous_output_kbps:0.03
instantaneous_input_repl_kbps:0.00
instantaneous_output_repl_kbps:0.00
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:0
expired_stale_perc:0.00
expired_time_cap_reached_count:0
expire_cycle_cpu_milliseconds:145
evicted_keys:0
evicted_clients:0
total_eviction_exceeded_time:0
current_eviction_exceeded_time:0
keyspace_hits:0
keyspace_misses:0
pubsub_channels:0
pubsub_patterns:0
pubsubshard_channels:0
latest_fork_usec:655
total_forks:1
migrate_cached_sockets:0
slave_expires_tracked_keys:0
active_defrag_hits:0
active_defrag_misses:0
active_defrag_key_hits:0
active_defrag_key_misses:0
total_active_defrag_time:0
current_active_defrag_time:0
tracking_total_keys:0
tracking_total_items:0
tracking_total_prefixes:0
unexpected_error_replies:0
total_error_replies:1
dump_payload_sanitizations:0
total_reads_processed:23
total_writes_processed:1
io_threaded_reads_processed:0
io_threaded_writes_processed:0
reply_buffer_shrinks:11
reply_buffer_expands:0

# Replication
role:master
connected_slaves:0
master_failover_state:no-failover
master_replid:9f94f04230905d4de9704bb3f136bf5fa6565e61
master_replid2:0000000000000000000000000000000000000000
master_repl_offset:0
second_repl_offset:-1
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0

# CPU
used_cpu_sys:6.792240
used_cpu_user:5.546017
used_cpu_sys_children:0.000000
used_cpu_user_children:0.004465
used_cpu_sys_main_thread:6.791629
used_cpu_user_main_thread:5.545542

# Modules

# Errorstats
errorstat_ERR:count=1

# Cluster
cluster_enabled:0

# Keyspace
db0:keys=3,expires=0,avg_ttl=0

241984 - Apache 2.4.x < 2.4.64 Multiple Vulnerabilities
-
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
The version of Apache httpd installed on the remote host is prior to 2.4.64. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.64 advisory.

- In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.
Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to on. (CVE-2025-49630)

- HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
(CVE-2024-42516)

- SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. (CVE-2024-43204)

- Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
(CVE-2024-43394)

- Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with %{varname}x or %{varname}c to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. (CVE-2024-47252)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Apache version 2.4.64 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS v3.0 Temporal Score
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
6.0
EPSS Score
0.0004
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS v2.0 Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
Plugin Information
Published: 2025/07/11, Modified: 2025/07/18
Plugin Output

tcp/80/www


URL : http://192.168.6.11/
Installed version : 2.4.62
Fixed version : 2.4.64

241984 - Apache 2.4.x < 2.4.64 Multiple Vulnerabilities
-
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
The version of Apache httpd installed on the remote host is prior to 2.4.64. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.64 advisory.

- In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.
Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to on. (CVE-2025-49630)

- HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
(CVE-2024-42516)

- SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. (CVE-2024-43204)

- Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
(CVE-2024-43394)

- Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with %{varname}x or %{varname}c to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. (CVE-2024-47252)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Apache version 2.4.64 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS v3.0 Temporal Score
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
6.0
EPSS Score
0.0004
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS v2.0 Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
Plugin Information
Published: 2025/07/11, Modified: 2025/07/18
Plugin Output

tcp/8081/www


URL : http://192.168.6.11:8081/
Installed version : 2.4.62
Fixed version : 2.4.64

42411 - Microsoft Windows SMB Shares Unprivileged Access
-
Synopsis
It is possible to access a network share.
Description
The remote host has one or more Windows shares that can be accessed through the network with the given credentials.

Depending on the share rights, it may allow an attacker to read/write confidential data.
Solution
To restrict access under Windows, open Explorer, right click on each share, go to the 'Sharing' tab, and click on 'Permissions'.
Risk Factor
High
VPR Score
6.6
EPSS Score
0.0866
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
References
Plugin Information
Published: 2009/11/06, Modified: 2025/02/26
Plugin Output

tcp/445/cifs


The following shares can be accessed using a NULL session :

- confidential - (readable,writable)
+ Content of this share :
..
Strategic_Network_Enhancements_and_Security_Assessments_for_2025-2026.txt
Keepass_Vault

42256 - NFS Shares World Readable
-
Synopsis
The remote NFS server exports world-readable shares.
Description
The remote NFS server is exporting one or more shares without restricting access (based on hostname, IP, or IP range).
See Also
Solution
Place the appropriate restrictions on all NFS shares.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2009/10/26, Modified: 2024/02/21
Plugin Output

tcp/2049/rpc-nfs_acl


The following shares have no access restrictions :

/mnt/nfs_share *

41028 - SNMP Agent Default Community Name (public)
-
Synopsis
The community name of the remote SNMP server can be guessed.
Description
It is possible to obtain the default community name of the remote SNMP server.

An attacker may use this information to gain more knowledge about the remote host, or to change the configuration of the remote system (if the default community allows such modifications).
Solution
Disable the SNMP service on the remote host if you do not use it.
Either filter incoming UDP packets going to this port, or change the default community string.
Risk Factor
High
VPR Score
5.2
EPSS Score
0.9233
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
References
Plugin Information
Published: 2002/11/25, Modified: 2022/06/01
Plugin Output

udp/161/snmp


The remote SNMP server replies to the following default community
string :

public

242629 - Apache 2.4.x < 2.4.65
-
Synopsis
The remote web server is affected by a vulnerability.
Description
The version of Apache httpd installed on the remote host is prior to 2.4.65. It is, therefore, affected by a vulnerability as referenced in the 2.4.65 advisory.

- A bug in Apache HTTP Server 2.4.64 results in all RewriteCond expr ... tests evaluating as true. Users are recommended to upgrade to version 2.4.65, which fixes the issue. (CVE-2025-54090)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Apache version 2.4.65 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
6.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
CVSS v3.0 Temporal Score
5.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.2
EPSS Score
0.0004
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
CVE CVE-2025-54090
XREF IAVA:2025-A-0547
Plugin Information
Published: 2025/07/23, Modified: 2025/07/25
Plugin Output

tcp/80/www


URL : http://192.168.6.11/
Installed version : 2.4.62
Fixed version : 2.4.65

242629 - Apache 2.4.x < 2.4.65
-
Synopsis
The remote web server is affected by a vulnerability.
Description
The version of Apache httpd installed on the remote host is prior to 2.4.65. It is, therefore, affected by a vulnerability as referenced in the 2.4.65 advisory.

- A bug in Apache HTTP Server 2.4.64 results in all RewriteCond expr ... tests evaluating as true. Users are recommended to upgrade to version 2.4.65, which fixes the issue. (CVE-2025-54090)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Apache version 2.4.65 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
6.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
CVSS v3.0 Temporal Score
5.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.2
EPSS Score
0.0004
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
CVE CVE-2025-54090
XREF IAVA:2025-A-0547
Plugin Information
Published: 2025/07/23, Modified: 2025/07/25
Plugin Output

tcp/8081/www


URL : http://192.168.6.11:8081/
Installed version : 2.4.62
Fixed version : 2.4.65

40984 - Browsable Web Directories
-
Synopsis
Some directories on the remote web server are browsable.
Description
Multiple Nessus plugins identified directories on the web server that are browsable.
See Also
Solution
Make sure that browsable directories do not leak confidential information or give access to sensitive resources. Additionally, use access restrictions or disable directory indexing for any that do.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2009/09/15, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following directories are browsable :

http://192.168.6.11/includes/
http://192.168.6.11/templates/
http://192.168.6.11/uploads/

40984 - Browsable Web Directories
-
Synopsis
Some directories on the remote web server are browsable.
Description
Multiple Nessus plugins identified directories on the web server that are browsable.
See Also
Solution
Make sure that browsable directories do not leak confidential information or give access to sensitive resources. Additionally, use access restrictions or disable directory indexing for any that do.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2009/09/15, Modified: 2021/01/19
Plugin Output

tcp/8081/www


The following directories are browsable :

http://192.168.6.11:8081/

12217 - DNS Server Cache Snooping Remote Information Disclosure
-
Synopsis
The remote DNS server is vulnerable to cache snooping attacks.
Description
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.

This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited.

For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported.
See Also
Solution
Contact the vendor of the DNS software for a fix.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2004/04/27, Modified: 2020/04/07
Plugin Output

udp/53/dns


Nessus sent a non-recursive query for example.com
and received 6 answers :

23.192.228.84
23.215.0.136
23.215.0.138
96.7.128.175
96.7.128.198
23.192.228.80

10595 - DNS Server Zone Transfer Information Disclosure (AXFR)
-
Synopsis
The remote name server allows zone transfers
Description
The remote name server allows DNS zone transfers to be performed.

A zone transfer lets a remote attacker instantly populate a list of potential targets. In addition, companies often use a naming convention that can give hints as to a servers primary application (for instance, proxy.example.com, payroll.example.com, b2b.example.com, etc.).

As such, this information is of great use to an attacker, who may use it to gain information about the topology of the network and spot new targets.
See Also
Solution
Limit DNS zone transfers to only the servers that need the information.
Risk Factor
Medium
VPR Score
4.4
EPSS Score
0.8323
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
4.2 (CVSS2#E:U/RL:ND/RC:C)
References
Plugin Information
Published: 2001/01/16, Modified: 2025/05/06
Plugin Output

tcp/53/dns


+ Domain "localhost":
localhost. name server localhost.
localhost. has address 127.0.0.1
localhost. has IPv6 address 0000:0000:0000:0000:0000:0000:0000:0001

50686 - IP Forwarding Enabled
-
Synopsis
The remote host has IP forwarding enabled.
Description
The remote host has IP forwarding enabled. An attacker can exploit this to route packets through the host and potentially bypass some firewalls / routers / NAC filtering.

Unless the remote host is a router, it is recommended that you disable IP forwarding.
Solution
On Linux, you can disable IP forwarding by doing :

echo 0 > /proc/sys/net/ipv4/ip_forward

On Windows, set the key 'IPEnableRouter' to 0 under

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters

On Mac OS X, you can disable IP forwarding by executing the command :

sysctl -w net.inet.ip.forwarding=0

For other systems, check with your vendor.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)
VPR Score
4.0
EPSS Score
0.0596
CVSS v2.0 Base Score
5.8 (CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P)
References
Plugin Information
Published: 2010/11/23, Modified: 2023/10/17
Plugin Output

tcp/0

IP forwarding appears to be enabled on the remote host.

Detected local MAC Address : bc24114cb560
Response from local MAC Address : bc24114cb560

Detected Gateway MAC Address : bc2411b5f94a
Response from Gateway MAC Address : bc2411b5f94a

227562 - Jenkins LTS < 2.492.2 / Jenkins weekly < 2.500 Multiple Vulnerabilities
-
Synopsis
An application running on a remote web server host is affected by multiple vulnerabilities
Description
According to its its self-reported version number, the version of Jenkins running on the remote web server is Jenkins LTS prior to 2.492.2 or Jenkins weekly prior to 2.500. It is, therefore, affected by multiple vulnerabilities:

- Medium Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets. Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim's user profile in Jenkins. Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint. (CVE-2025-27624)

- Medium Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing config.xml of agents via REST API or CLI. This allows attackers with Agent/Extended Read permission to view encrypted values of secrets. This issue is related to SECURITY-266 in the 2016-05-11 security advisory. Jenkins 2.500, LTS 2.492.2 redacts the encrypted values of secrets stored in agent config.xml accessed via REST API or CLI for users lacking Agent/Configure permission. (CVE-2025-27622)

- Medium Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing config.xml of views via REST API or CLI. This allows attackers with View/Read permission to view encrypted values of secrets. This issue is related to SECURITY-266 in the 2016-05-11 security advisory.
Jenkins 2.500, LTS 2.492.2 redacts the encrypted values of secrets stored in view config.xml accessed via REST API or CLI for users lacking View/Configure permission. (CVE-2025-27623)

- Medium Various features in Jenkins redirect users to partially user-controlled URLs inside Jenkins. To prevent open redirect vulnerabilities, Jenkins limits redirections to safe URLs (neither absolute nor scheme-relative/network-path reference). In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (\) characters are considered safe. This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects. Jenkins 2.500, LTS 2.492.2 considers redirects to URLs starting with backslash (\) characters to be unsafe, rejecting such redirects.
(CVE-2025-27625)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade Jenkins weekly to version 2.500 or later, or Jenkins LTS to version 2.492.2 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
5.4 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)
CVSS v3.0 Temporal Score
4.7 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
2.5
EPSS Score
0.0003
CVSS v2.0 Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVSS v2.0 Temporal Score
4.7 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2025-27622
CVE CVE-2025-27623
CVE CVE-2025-27624
CVE CVE-2025-27625
XREF JENKINS:2025-03-05
Plugin Information
Published: 2025/03/05, Modified: 2025/03/05
Plugin Output

tcp/8080/www


Product : Jenkins Open Source LTS
URL : http://192.168.6.11:8080/
Installed version : 2.492.1
Fixed version : 2.492.2
233779 - Jenkins LTS < 2.492.3 / Jenkins weekly < 2.504 Multiple Vulnerabilities
-
Synopsis
An application running on a remote web server host is affected by multiple vulnerabilities
Description
According to its its self-reported version number, the version of Jenkins running on the remote web server is Jenkins LTS prior to 2.492.3 or Jenkins weekly prior to 2.504. It is, therefore, affected by multiple vulnerabilities:

- A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining access to encrypted secrets in its configuration. (CVE-2025-31721)

- A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration. (CVE-2025-31720)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade Jenkins weekly to version 2.504 or later, or Jenkins LTS to version 2.492.3 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
3.8 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
1.4
EPSS Score
0.0003
CVSS v2.0 Base Score
4.0 (CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
CVE CVE-2025-31720
CVE CVE-2025-31721
XREF JENKINS:2025-04-02
XREF IAVA:2025-A-0220
Plugin Information
Published: 2025/04/02, Modified: 2025/04/04
Plugin Output

tcp/8080/www


Product : Jenkins Open Source LTS
URL : http://192.168.6.11:8080/
Installed version : 2.492.1
Fixed version : 2.492.3

57608 - SMB Signing not required
-
Synopsis
Signing is not required on the remote SMB server.
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
See Also
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information
Published: 2012/01/19, Modified: 2022/10/05
Plugin Output

tcp/445/cifs

76474 - SNMP 'GETBULK' Reflection DDoS
-
Synopsis
The remote SNMP daemon is affected by a vulnerability that allows a reflected distributed denial of service attack.
Description
The remote SNMP daemon is responding with a large amount of data to a 'GETBULK' request with a larger than normal value for 'max-repetitions'. A remote attacker can use this SNMP server to conduct a reflected distributed denial of service attack on an arbitrary remote host.
See Also
Solution
Disable the SNMP service on the remote host if you do not use it.
Otherwise, restrict and monitor access to this service, and consider changing the default 'public' community string.
Risk Factor
Medium
VPR Score
3.6
EPSS Score
0.0787
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
Plugin Information
Published: 2014/07/11, Modified: 2023/11/08
Plugin Output

udp/161/snmp


Nessus was able to determine the SNMP service can be abused in an SNMP
Reflection DDoS attack :

Request size (bytes) : 42
Response size (bytes) : 2498

85582 - Web Application Potentially Vulnerable to Clickjacking
-
Synopsis
The remote web server may fail to mitigate a class of web application vulnerabilities.
Description
The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.

Content-Security-Policy (CSP) has been proposed by the W3C Web Application Security Working Group, with increasing support among all major browser vendors, as a way to mitigate clickjacking and other attacks. The 'frame-ancestors' policy directive restricts which sources can embed the protected resource.

Note that while the X-Frame-Options and Content-Security-Policy response headers are not the only mitigations for clickjacking, they are currently the most reliable methods that can be detected through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g., frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions.
See Also
Solution
Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response.
This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.
Risk Factor
Medium
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
XREF CWE:693
Plugin Information
Published: 2015/08/22, Modified: 2017/05/16
Plugin Output

tcp/80/www


The following pages do not use a clickjacking mitigation response header and contain a clickable event :

- http://192.168.6.11/access.php
- http://192.168.6.11/docs.php
- http://192.168.6.11/feedback.php
- http://192.168.6.11/integrations.php
- http://192.168.6.11/partners.php
- http://192.168.6.11/payments.php
- http://192.168.6.11/portfolio.php
- http://192.168.6.11/profile.php
- http://192.168.6.11/transactions.php
- http://192.168.6.11/upload.php

85582 - Web Application Potentially Vulnerable to Clickjacking
-
Synopsis
The remote web server may fail to mitigate a class of web application vulnerabilities.
Description
The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.

Content-Security-Policy (CSP) has been proposed by the W3C Web Application Security Working Group, with increasing support among all major browser vendors, as a way to mitigate clickjacking and other attacks. The 'frame-ancestors' policy directive restricts which sources can embed the protected resource.

Note that while the X-Frame-Options and Content-Security-Policy response headers are not the only mitigations for clickjacking, they are currently the most reliable methods that can be detected through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g., frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions.
See Also
Solution
Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response.
This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.
Risk Factor
Medium
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
XREF CWE:693
Plugin Information
Published: 2015/08/22, Modified: 2017/05/16
Plugin Output

tcp/8081/www


The following pages do not use a clickjacking mitigation response header and contain a clickable event :

- http://192.168.6.11:8081/csrf_attack.html

10114 - ICMP Timestamp Request Remote Date Disclosure
-
Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
Low
VPR Score
2.2
EPSS Score
0.0037
CVSS v2.0 Base Score
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
References
Plugin Information
Published: 1999/08/01, Modified: 2024/10/07
Plugin Output

icmp/0

The remote clock is synchronized with the local clock.

42057 - Web Server Allows Password Auto-Completion
-
Synopsis
The 'autocomplete' attribute is not disabled on password fields.
Description
The remote web server contains at least one HTML form field that has an input of type 'password' where 'autocomplete' is not set to 'off'.

While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or if their machine is compromised at some point.
Solution
Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials.
Risk Factor
Low
Plugin Information
Published: 2009/10/07, Modified: 2023/07/17
Plugin Output

tcp/80/www

Page : /profile.php
Destination Page: /profile.php

Page : /access.php
Destination Page: /access.php
26194 - Web Server Transmits Cleartext Credentials
-
Synopsis
The remote web server might transmit credentials in cleartext.
Description
The remote web server contains several HTML form fields containing an input of type 'password' which transmit their information to a remote web server in cleartext.

An attacker eavesdropping the traffic between web browser and server may obtain logins and passwords of valid users.
Solution
Make sure that every sensitive form transmits content over HTTPS.
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
References
XREF CWE:522
XREF CWE:523
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2007/09/28, Modified: 2016/11/29
Plugin Output

tcp/80/www

Page : /profile.php
Destination Page: /profile.php

Page : /access.php
Destination Page: /access.php
48204 - Apache HTTP Server Version
-
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
See Also
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
Plugin Information
Published: 2010/07/30, Modified: 2023/08/17
Plugin Output

tcp/80/www


URL : http://192.168.6.11/
Version : 2.4.62
Source : Server: Apache/2.4.62 (Debian)
backported : 0
os : Debian

48204 - Apache HTTP Server Version
-
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
See Also
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
Plugin Information
Published: 2010/07/30, Modified: 2023/08/17
Plugin Output

tcp/8081/www


URL : http://192.168.6.11:8081/
Version : 2.4.62
Source : Server: Apache/2.4.62 (Debian)
backported : 0
os : Debian

39519 - Backported Security Patch Detection (FTP)
-
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote FTP server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/21/ftp


Give Nessus credentials to perform local checks.

39520 - Backported Security Patch Detection (SSH)
-
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote SSH server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/22/ssh


Give Nessus credentials to perform local checks.

45590 - Common Platform Enumeration (CPE)
-
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/04/21, Modified: 2025/07/14
Plugin Output

tcp/0


The remote operating system matched the following CPE :

cpe:/o:linux:linux_kernel -> Linux Kernel

Following application CPE's matched on the remote system :

cpe:/a:apache:http_server:2.4.62 -> Apache Software Foundation Apache HTTP Server
cpe:/a:cloudbees:jenkins:2.492.1 -> CloudBees Jenkins
cpe:/a:eclipse:jetty:12.0.16 -> Eclipse Jetty
cpe:/a:isc:bind:9.18.28-1~deb12u2-debian -> ISC BIND
cpe:/a:isc:bind:9.18.28:1 -> ISC BIND
cpe:/a:mariadb:mariadb:10.11.6 -> MariaDB for Node.js
cpe:/a:mysql:mysql:5.5.5-10.11.6-mariadb-0%2bdeb12u1 -> MySQL MySQL
cpe:/a:openbsd:openssh:9.2 -> OpenBSD OpenSSH
cpe:/a:openbsd:openssh:9.2p1 -> OpenBSD OpenSSH
cpe:/a:pivotal_software:redis:7.0.15 -> Piviotal Software Redis

10736 - DCE Services Enumeration
-
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output

tcp/445/cifs


The following DCERPC services are available remotely :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 82273fdc-e32a-18c3-3f78-827929dc23ea, version 0.0
Description : Event Log Service
Windows process : services.exe
Annotation : eventlog
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8d9f4e40-a03d-11ce-8f69-08003e30051b, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : ntsvcs
Type : Remote RPC service
Named pipe : \pipe\ntsvcs
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8d9f4e40-a03d-11ce-8f69-08003e30051b, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : ntsvcs
Type : Remote RPC service
Named pipe : \pipe\plugplay
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a8e0653c-2744-4389-a61d-7373df8b2292, version 1.0
Description : Unknown RPC service
Annotation : FileServerVssAgent
Type : Remote RPC service
Named pipe : \pipe\FssagentRpc
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 885d85fb-c754-4062-a0e7-6872ce0064f4, version 2.0
Description : Unknown RPC service
Annotation : mdssvc
Type : Remote RPC service
Named pipe : \pipe\mdssvc
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 338cd001-2244-31f1-aaaa-900038001003, version 1.0
Description : Remote Registry
Windows process : svchost.exe
Annotation : winreg
Type : Remote RPC service
Named pipe : \pipe\winreg
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4b324fc8-1670-01d3-1278-5a47bf6ee188, version 3.0
Description : Server Service
Windows process : svchost.exe
Annotation : srvsvc
Type : Remote RPC service
Named pipe : \pipe\srvsvc
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Annotation : lsarpc
Type : Remote RPC service
Named pipe : \pipe\lsarpc
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Annotation : lsarpc
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : spoolss
Type : Remote RPC service
Named pipe : \pipe\spoolss
Netbios name :

10028 - DNS Server BIND version Directive Remote Version Detection
-
Synopsis
It is possible to obtain the version number of the remote DNS server.
Description
The remote host is running BIND or another DNS server that reports its version number when it receives a special request for the text 'version.bind' in the domain 'chaos'.

This version is not necessarily accurate and could even be forged, as some DNS servers send the information based on a configuration file.
Solution
It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in named.conf.
Risk Factor
None
References
XREF IAVT:0001-T-0583
Plugin Information
Published: 1999/10/12, Modified: 2022/10/12
Plugin Output

udp/53/dns


Version : 9.18.28-1~deb12u2-Debian

11002 - DNS Server Detection
-
Synopsis
A DNS server is listening on the remote host.
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.
See Also
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Published: 2003/02/13, Modified: 2017/05/16
Plugin Output

tcp/53/dns

11002 - DNS Server Detection
-
Synopsis
A DNS server is listening on the remote host.
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.
See Also
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Published: 2003/02/13, Modified: 2017/05/16
Plugin Output

udp/53/dns

72779 - DNS Server Version Detection
-
Synopsis
Nessus was able to obtain version information on the remote DNS server.
Description
Nessus was able to obtain version information by sending a special TXT record query to the remote host.

Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the information based on a configuration file.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0937
Plugin Information
Published: 2014/03/03, Modified: 2024/09/24
Plugin Output

tcp/53/dns


DNS server answer for "version.bind" (over TCP) :

9.18.28-1~deb12u2-Debian

35371 - DNS Server hostname.bind Map Hostname Disclosure
-
Synopsis
The DNS server discloses the remote host name.
Description
It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the CHAOS domain.
Solution
It may be possible to disable this feature. Consult the vendor's documentation for more information.
Risk Factor
None
Plugin Information
Published: 2009/01/15, Modified: 2011/09/14
Plugin Output

udp/53/dns


The remote host name is :

debian

54615 - Device Type
-
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/05/23, Modified: 2025/03/12
Plugin Output

tcp/0

Remote device type : general-purpose
Confidence level : 98
194915 - Eclipse Jetty Web Server Detection
-
Synopsis
The Eclipse Jetty web server was detected on the remote host.
Description
The Eclipse Jetty web server was detected on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2024/05/02, Modified: 2025/07/14
Plugin Output

tcp/0


URL : http://192.168.6.11:8080/
Version : 12.0.16
Source : Server: Jetty(12.0.16)
35716 - Ethernet Card Manufacturer Detection
-
Synopsis
The manufacturer can be identified from the Ethernet OUI.
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are registered by IEEE.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/02/19, Modified: 2020/05/13
Plugin Output

tcp/0


The following card manufacturers were identified :

BC:24:11:B5:F9:4A : Proxmox Server Solutions GmbH
86420 - Ethernet MAC Addresses
-
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2015/10/16, Modified: 2025/06/10
Plugin Output

tcp/0

The following is a consolidated list of detected MAC addresses:
- BC:24:11:B5:F9:4A
- E6:AC:88:E0:BE:66
- 7E:FF:B7:BF:F3:CC
- AA:FA:9E:78:03:EF

49704 - External URLs
-
Synopsis
Links to external sites were gathered.
Description
Nessus gathered HREF links to external sites by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2011/08/19
Plugin Output

tcp/80/www


1 external URL was gathered on this web server :
URL... - Seen on...


https://owasp.org/www-project-top-ten/ - /

49704 - External URLs
-
Synopsis
Links to external sites were gathered.
Description
Nessus gathered HREF links to external sites by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2011/08/19
Plugin Output

tcp/8081/www


1 external URL was gathered on this web server :
URL... - Seen on...


http://192.168.2.11/transfer_funds.php - /csrf_attack.html

10092 - FTP Server Detection
-
Synopsis
An FTP server is listening on a remote port.
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Plugin Information
Published: 1999/10/12, Modified: 2023/08/17
Plugin Output

tcp/21/ftp


The remote FTP banner is :

220 (vsFTPd 3.0.3)

43111 - HTTP Methods Allowed (per directory)
-
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

The following HTTP methods are considered insecure:
PUT, DELETE, CONNECT, TRACE, HEAD

Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.

As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.

Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/12/10, Modified: 2022/04/11
Plugin Output

tcp/80/www

Based on the response to an OPTIONS request :

- HTTP methods GET HEAD OPTIONS POST are allowed on :

/icons
/includes
/templates
/uploads

43111 - HTTP Methods Allowed (per directory)
-
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

The following HTTP methods are considered insecure:
PUT, DELETE, CONNECT, TRACE, HEAD

Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.

As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.

Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/12/10, Modified: 2022/04/11
Plugin Output

tcp/8081/www

Based on the response to an OPTIONS request :

- HTTP methods GET HEAD OPTIONS POST are allowed on :

/
/icons

10107 - HTTP Server Type and Version
-
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output

tcp/80/www

The remote web server type is :

Apache/2.4.62 (Debian)

10107 - HTTP Server Type and Version
-
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output

tcp/8080/www

The remote web server type is :

Jetty(12.0.16)

10107 - HTTP Server Type and Version
-
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output

tcp/8081/www

The remote web server type is :

Apache/2.4.62 (Debian)

24260 - HyperText Transfer Protocol (HTTP) Information
-
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output

tcp/80/www


Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Sun, 10 Aug 2025 00:12:30 GMT
Server: Apache/2.4.62 (Debian)
Vary: Accept-Encoding
Content-Length: 5964
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

Response Body :

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Certisysnet Bank</title>
<link rel="stylesheet" href="style.css">
<style>
body {
margin: 0;
font-family: Arial, sans-serif;
background-color: #f4f4f4;
}
header {
background: linear-gradient(90deg, #0a3d62, #1e3799);
color: white;
padding: 20px 0;
text-align: center;
box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.2);
}
.logo {
font-size: 2em;
font-weight: bold;
margin-bottom: 10px;
}
.navbar {
display: flex;
justify-content: center;
flex-wrap: wrap;
gap: 10px;
padding: 10px 0;
}
.navbar a {
background: white;
color: #1e3799;
text-decoration: none;
padding: 12px 20px;
margin: 5px;
font-size: 1.1em;
font-weight: bold;
border-radius: 8px;
box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);
transition: background 0.3s, transform 0.2s;
}
.navbar a:hover {
background: #1e3799;
color: white;
transform: scale(1.05);
}
</style>
</head>
<body>

<header>
<div class="logo">Certisysnet Bank</div>
<nav class="navbar">
<a href="index.php">Home</a>
<a href="portfolio.php">Portfolio</a>
<a href="integrations.php">Integrations</a>
<a href="partners.php">Partners</a>
<a href="docs.php">Docs</a>
<a href="transactions.php">Transactions</a>
<a href="payments.php">Payments</a>
<a href="profile.php">Profile</a>
<a href="upload.php">Upload</a>
<a href="access.php">Access</a>
<a href="feedback.php">Feedback</a>
</nav>
</header>

<div class="banner">
<div class="banner-content">
<h1>💳 Certisysnet Bank 💳 </h1>
<p>Developed by: https://certisysnet-solutions.com</p>
</div>
</div>

<section class="about-section">
<h2> About Certisysnet Bank</h2>
<p>Certisysnet Bank is dedicated to providing world-class financial solutions tailored to the modern customer. Whether you're managing your personal finances, running a business, or investing for the future, we offer the tools and expertise to help you succeed.</p>
<ul>
<li><strong>Fast and Reliable Transactions:</strong> Enjoy seamless banking with real-time processing.</li>
<li><strong>Personalized Banking Experience:</strong> Tailored services that adapt to your financial needs.</li>
<li><strong>Global Financial Access:</strong> Manage your money from anywhere, anytime.</li>
</ul>
</section>

<section class="news-section">
<h2> Trending Financial News</h2>
<div class="news-container">
<div class="news-card">
<div class="news-content">
<h3> Market Boom in Early 2025</h3>
<p>Stock markets soar with a 10% increase in trading activity, signaling strong economic confidence.</p>
</div>
</div>
<div class="news-card">
<div class="news-content">
<h3> AI Revolution in Banking</h3>
<p>Certisysnet unveils AI-driven banking solutions, transforming customer experience with seamless automation.</p>
</div>
</div>
<div class="news-card">
<div class="news-content">
<h3>Digital Payments Skyrocket</h3>
<p>Mobile banking and digital wallets see a 50% surge as cashless transactions become the new norm.</p>
</div>
</div>
</div>
</section>

<style>
.about-section {
text-align: center;
padding: 40px;
background-color: #ffffff;
}
.about-section h2 {
color: #2c3e50;
}
.about-section p {
font-size: 1.1em;
color: #555;
max-width: 800px;
margin: auto;
}
.about-section ul {
text-align: left;
display: inline-block;
margin-top: 20px;
}
.about-section li {
font-size: 1.1em;
padding: 10px 0;
}
.news-section {
text-align: center;
padding: 40px;
background-color: #f8f9fa;
}
.news-container {
display: flex;
justify-content: center;
gap: 20px;
flex-wrap: wrap;
}
.news-card {
background: white;
border-radius: 10px;
box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);
padding: 20px;
max-width: 350px;
text-align: left;
transition: transform 0.3s ease-in-out;
}
.news-card:hover {
transform: scale(1.05);
}
.news-content {
padding: 15px;
}
.news-card h3 {
color: #2c3e50;
font-size: 1.5em;
}
.news-card p {
font-size: 1em;
color: #555;
}
</style>

<footer>
<div class="footer-content">
<p>&copy; 2025 Certisysnet Bank - Developed by: https://certisysnet-solutions.com - All rights reserved.</p>
<p><strong>Disclaimer:</strong> This is a simulated banking environment created for **educational and cybersecurity training purposes only**.
No real financial transactions take place, and no real customer data is used.
This site is designed to help cybersecurity professionals and ethical hackers practice **penetration testing and security awareness**.</p>

<p><strong>Reference:</strong> OWASP. (2025). OWASP Top 10 – A List of the Most Significant Security Risks for Web Applications. Available at: <a href="https://owasp.org/www-project-top-ten/" target="_blank" style="color: #f1c40f;">OWASP Top 10</a></p>

</div>
</footer>
</body>
</html>

24260 - HyperText Transfer Protocol (HTTP) Information
-
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output

tcp/8080/www


Response Code : HTTP/1.1 403 Forbidden

Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Server: Jetty(12.0.16)
Date: Sun, 10 Aug 2025 00:12:30 GMT
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Content-Type: text/html;charset=utf-8
X-Hudson: 1.395
X-Jenkins: 2.492.1
X-Jenkins-Session: 94394b89
Connection: close

Response Body :

<html><head><meta http-equiv='refresh' content='1;url=/login?from=%2F'/><script id='redirect' data-redirect-url='/login?from=%2F' src='/static/94394b89/scripts/redirect.js'></script></head><body style='background-color:white; color:white;'>
Authentication required
<!--
-->

</body></html>

24260 - HyperText Transfer Protocol (HTTP) Information
-
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output

tcp/8081/www


Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Sun, 10 Aug 2025 00:12:30 GMT
Server: Apache/2.4.62 (Debian)
Vary: Accept-Encoding
Content-Length: 766
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8

Response Body :

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
<tr><td valign="top"><img src="/icons/text.gif" alt="[TXT]"></td><td><a href="csrf_attack.html">csrf_attack.html</a></td><td align="right">2025-02-01 22:20 </td><td align="right">817 </td><td>&nbsp;</td></tr>
<tr><th colspan="5"><hr></th></tr>
</table>
<address>Apache/2.4.62 (Debian) Server at 192.168.6.11 Port 8081</address>
</body></html>

65054 - Jenkins Detection
-
Synopsis
The remote web server hosts a job scheduling / management system.
Description
The remote web server hosts Jenkins, a job scheduling / management system and a drop-in replacement for Hudson.
See Also
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0638
Plugin Information
Published: 2013/03/06, Modified: 2024/10/03
Plugin Output

tcp/8080/www


URL : http://192.168.6.11:8080/
Version : 2.492.1
Edition : Open Source LTS
Hudson Version : 1.395
LTS : 1

17651 - Microsoft Windows SMB : Obtains the Password Policy
-
Synopsis
It is possible to retrieve the remote host's password policy using the supplied credentials.
Description
Using the supplied credentials it was possible to extract the password policy for the remote Windows host. The password policy must conform to the Informational System Policy.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/03/30, Modified: 2015/01/12
Plugin Output

tcp/445/cifs

The following password policy is defined on the remote host:

Minimum password len: 5
Password history len: 0
Maximum password age (d): No limit
Password must meet complexity requirements: Disabled
Minimum password age (d): 0
Forced logoff time (s): Not set
Locked account time (s): 1800
Time between failed logon (s): 1800
Number of invalid logon before locked out (s): 0
10859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration
-
Synopsis
It is possible to obtain the host SID for the remote host.
Description
By emulating the call to LsaQueryInformationPolicy(), it was possible to obtain the host SID (Security Identifier).

The host SID can then be used to get the list of local users.
See Also
Solution
You can prevent anonymous lookups of the host SID by setting the 'RestrictAnonymous' registry setting to an appropriate value.

Refer to the 'See also' section for guidance.
Risk Factor
None
Plugin Information
Published: 2002/02/13, Modified: 2024/01/31
Plugin Output

tcp/445/cifs


The remote host SID value is : S-1-5-21-91936944-1113920467-1233936890

The value of 'RestrictAnonymous' setting is : unknown
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
-
Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/10/17, Modified: 2021/09/20
Plugin Output

tcp/445/cifs

Nessus was able to obtain the following information about the host, by
parsing the SMB2 Protocol's NTLM SSP message:

Target Name: DEBIAN
NetBIOS Domain Name: DEBIAN
NetBIOS Computer Name: DEBIAN
DNS Domain Name:
DNS Computer Name: debian
DNS Tree Name: unknown
Product Version: 6.1.0

11011 - Microsoft Windows SMB Service Detection
-
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output

tcp/139/smb


An SMB server is running on this port.

11011 - Microsoft Windows SMB Service Detection
-
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output

tcp/445/cifs


A CIFS server is running on this port.
10395 - Microsoft Windows SMB Shares Enumeration
-
Synopsis
It is possible to enumerate remote network shares.
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2000/05/09, Modified: 2022/02/01
Plugin Output

tcp/445/cifs


Here are the SMB shares available on the remote host :

- print$
- confidential
- IPC$
- nobody
100871 - Microsoft Windows SMB Versions Supported (remote check)
-
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/06/19, Modified: 2019/11/22
Plugin Output

tcp/445/cifs


The remote host supports the following versions of SMB :
SMBv2
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)
-
Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2018/02/09, Modified: 2020/03/11
Plugin Output

tcp/445/cifs


The remote host supports the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
3.0 Windows 8
3.0.2 Windows 8.1
3.1.1 Windows 10

The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.1 Windows 10

50344 - Missing or Permissive Content-Security-Policy frame-ancestors HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive Content-Security-Policy (CSP) frame-ancestors response header or does not set one at all.

The CSP frame-ancestors header has been proposed by the W3C Web Application Security Working Group as a way to mitigate cross-site scripting and clickjacking attacks.
See Also
Solution
Set a non-permissive Content-Security-Policy frame-ancestors header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following pages do not set a Content-Security-Policy frame-ancestors response header or set a permissive policy:

- http://192.168.6.11/
- http://192.168.6.11/access.php
- http://192.168.6.11/docs.php
- http://192.168.6.11/feedback.php
- http://192.168.6.11/includes/
- http://192.168.6.11/index.php
- http://192.168.6.11/integrations.php
- http://192.168.6.11/partners.php
- http://192.168.6.11/payments.php
- http://192.168.6.11/portfolio.php
- http://192.168.6.11/profile.php
- http://192.168.6.11/templates/
- http://192.168.6.11/transactions.php
- http://192.168.6.11/upload.php
- http://192.168.6.11/uploads/
- http://192.168.6.11/uploads/e.php
- http://192.168.6.11/uploads/upload.php

50344 - Missing or Permissive Content-Security-Policy frame-ancestors HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive Content-Security-Policy (CSP) frame-ancestors response header or does not set one at all.

The CSP frame-ancestors header has been proposed by the W3C Web Application Security Working Group as a way to mitigate cross-site scripting and clickjacking attacks.
See Also
Solution
Set a non-permissive Content-Security-Policy frame-ancestors header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/8081/www


The following pages do not set a Content-Security-Policy frame-ancestors response header or set a permissive policy:

- http://192.168.6.11:8081/
- http://192.168.6.11:8081/csrf_attack.html

50345 - Missing or Permissive X-Frame-Options HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive X-Frame-Options response header or does not set one at all.

The X-Frame-Options header has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors
See Also
Solution
Set a properly configured X-Frame-Options header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following pages do not set a X-Frame-Options response header or set a permissive policy:

- http://192.168.6.11/
- http://192.168.6.11/access.php
- http://192.168.6.11/docs.php
- http://192.168.6.11/feedback.php
- http://192.168.6.11/includes/
- http://192.168.6.11/index.php
- http://192.168.6.11/integrations.php
- http://192.168.6.11/partners.php
- http://192.168.6.11/payments.php
- http://192.168.6.11/portfolio.php
- http://192.168.6.11/profile.php
- http://192.168.6.11/templates/
- http://192.168.6.11/transactions.php
- http://192.168.6.11/upload.php
- http://192.168.6.11/uploads/
- http://192.168.6.11/uploads/e.php
- http://192.168.6.11/uploads/upload.php

50345 - Missing or Permissive X-Frame-Options HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive X-Frame-Options response header or does not set one at all.

The X-Frame-Options header has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors
See Also
Solution
Set a properly configured X-Frame-Options header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/8081/www


The following pages do not set a X-Frame-Options response header or set a permissive policy:

- http://192.168.6.11:8081/
- http://192.168.6.11:8081/csrf_attack.html

10719 - MySQL Server Detection
-
Synopsis
A database server is listening on the remote port.
Description
The remote host is running MySQL, an open source database server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0802
Plugin Information
Published: 2001/08/13, Modified: 2022/10/12
Plugin Output

tcp/3306/mysql


Version : 5.5.5-10.11.6-MariaDB-0+deb12u1
Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_FOUND_ROWS (Found instead of affected rows)
CLIENT_LONG_FLAG (Get all column flags)
CLIENT_CONNECT_WITH_DB (One can specify db on connect)
CLIENT_NO_SCHEMA (Don't allow database.table.column)
CLIENT_COMPRESS (Can use compression protocol)
CLIENT_ODBC (ODBC client)
CLIENT_LOCAL_FILES (Can use LOAD DATA LOCAL)
CLIENT_IGNORE_SPACE (Ignore spaces before "(")
CLIENT_PROTOCOL_41 (New 4.1 protocol)
CLIENT_INTERACTIVE (This is an interactive client)
CLIENT_SIGPIPE (IGNORE sigpipes)
CLIENT_TRANSACTIONS (Client knows about transactions)
CLIENT_RESERVED (Old flag for 4.1 protocol)
CLIENT_SECURE_CONNECTION (New 4.1 authentication)

10437 - NFS Share Export List
-
Synopsis
The remote NFS server exports a list of shares.
Description
This plugin retrieves the list of NFS exported shares.
See Also
Solution
Ensure each share is intended to be exported.
Risk Factor
None
Plugin Information
Published: 2000/06/07, Modified: 2019/10/04
Plugin Output

tcp/2049/rpc-nfs_acl


Here is the export list of 192.168.6.11 :

/mnt/nfs_share *

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/0


Nessus SNMP scanner was able to retrieve the open port list
with the community name: p*****
It found 23 open TCP ports and 12 open UDP ports.

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/21/ftp

Port 21/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/22/ssh

Port 22/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/25/smtp

Port 25/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/53/dns

Port 53/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/53/dns

Port 53/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/80/www

Port 80/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/111/rpc-portmapper

Port 111/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/111/rpc-portmapper

Port 111/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/137/netbios-ns

Port 137/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/138

Port 138/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/139/smb

Port 139/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/161/snmp

Port 161/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/445/cifs

Port 445/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/2049/rpc-nfs_acl

Port 2049/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/3306/mysql

Port 3306/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/5353/mdns

Port 5353/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/6379/redis_server

Port 6379/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/8080/www

Port 8080/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/8081/www

Port 8081/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/34551

Port 34551/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/34611/rpc-status

Port 34611/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/37735

Port 37735/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/37814/rpc-nlockmgr

Port 37814/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/37841

Port 37841/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/38900/rpc-mountd

Port 38900/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/39079/rpc-mountd

Port 39079/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/39117/rpc-mountd

Port 39117/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/41770/rpc-mountd

Port 41770/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/42541/rpc-status

Port 42541/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/45785/rpc-nlockmgr

Port 45785/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/47217

Port 47217/udp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/54299

Port 54299/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/58251

Port 58251/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

tcp/58531/rpc-mountd

Port 58531/tcp was found to be open

14274 - Nessus SNMP Scanner
-
Synopsis
SNMP information is enumerated to learn about other open ports.
Description
This plugin runs an SNMP scan against the remote machine to find open ports.

See the section 'plugins options' to configure it.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/08/15, Modified: 2023/11/08
Plugin Output

udp/58635/rpc-mountd

Port 58635/udp was found to be open

19506 - Nessus Scan Information
-
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/08/26, Modified: 2025/06/25
Plugin Output

tcp/0

Information about this scan :

Nessus version : 10.9.2
Nessus build : 20017
Plugin feed version : 202508090726
Scanner edition used : Nessus
Scanner OS : LINUX
Scanner distribution : debian10-x86-64
Scan type : Normal
Scan name : Advanced_Scan_192.168.6.11
Scan policy used : Advanced Scan
Scanner IP : 192.168.6.10
Port scanner(s) : snmp_scanner
Port range : default
Ping RTT : 155.270 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : enabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2025/8/9 17:08 PDT (UTC -07:00)
Scan duration : 1142 sec
Scan for malware : no
209654 - OS Fingerprints Detected
-
Synopsis
Multiple OS fingerprints were detected.
Description
Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. While the highest-confidence result was reported in plugin 11936, “OS Identification”, the complete set of fingerprints detected are reported here.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2025/02/26, Modified: 2025/03/03
Plugin Output

tcp/0


Following OS Fingerprints were found

Remote operating system : Linux Kernel 6.1.0-29-amd64
Confidence level : 98
Method : SNMP
Type : general-purpose
Fingerprint : SNMP:Linux debian 6.1.0-29-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01-02) x86_64

Remote operating system : Linux Kernel 2.6
Confidence level : 65
Method : SinFP
Type : general-purpose
Fingerprint : SinFP:
P1:B10113:F0x12:W64240:O0204ffff:M1460:
P2:B10113:F0x12:W65160:O0204ffff0402080affffffff4445414401030306:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191302_7_p=39079

Following fingerprints could not be used to determine OS :
SSH:!:SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u4
HTTP:!:Server: Apache/2.4.62 (Debian)

SMTP:!:220 debian ESMTP Postfix (Debian/GNU)
11936 - OS Identification
-
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2003/12/09, Modified: 2025/06/03
Plugin Output

tcp/0


Remote operating system : Linux Kernel 6.1.0-29-amd64
Confidence level : 98
Method : SNMP

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

SSH:!:SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u4
SNMP:Linux debian 6.1.0-29-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01-02) x86_64
SinFP:
P1:B10113:F0x12:W64240:O0204ffff:M1460:
P2:B10113:F0x12:W65160:O0204ffff0402080affffffff4445414401030306:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191302_7_p=39079
HTTP:!:Server: Apache/2.4.62 (Debian)

SMTP:!:220 debian ESMTP Postfix (Debian/GNU)


The remote host is running Linux Kernel 6.1.0-29-amd64
117886 - OS Security Patch Assessment Not Available
-
Synopsis
OS Security Patch Assessment is not available.
Description
OS Security Patch Assessment is not available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the target, the target may not have been identified, or another issue may have occurred that prevented OS security patch assessment from being available. See plugin output for details.

This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not Supported' will report concurrently with this plugin.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Published: 2018/10/02, Modified: 2021/07/12
Plugin Output

tcp/0


The following issues were reported :

- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.

181418 - OpenSSH Detection
-
Synopsis
An OpenSSH-based SSH server was detected on the remote host.
Description
An OpenSSH-based SSH server was detected on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2023/09/14, Modified: 2025/07/28
Plugin Output

tcp/22/ssh


Service : ssh
Version : 9.2p1
Banner : SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u4

66334 - Patch Report
-
Synopsis
The remote host is missing several patches.
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.

Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends on this plugin, it will always run and cannot be disabled.
Solution
Install the patches listed below.
Risk Factor
None
Plugin Information
Published: 2013/07/08, Modified: 2025/07/14
Plugin Output

tcp/0



. You need to take the following 2 actions :


[ Apache 2.4.x < 2.4.65 (242629) ]

+ Action to take : Upgrade to Apache version 2.4.65 or later.

+Impact : Taking this action will resolve 9 different vulnerabilities (CVEs).



[ Jenkins LTS < 2.492.3 / Jenkins weekly < 2.504 Multiple Vulnerabilities (233779) ]

+ Action to take : Upgrade Jenkins weekly to version 2.504 or later, or Jenkins LTS to version 2.492.3 or later.

+Impact : Taking this action will resolve 4 different vulnerabilities (CVEs).


11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/111/rpc-portmapper


The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/111/rpc-portmapper


The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/2049/rpc-nfs_acl


The following RPC services are available on TCP port 2049 :

- program: 100003 (nfs), version: 3
- program: 100003 (nfs), version: 4
- program: 100227 (nfs_acl), version: 3

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/34611/rpc-status


The following RPC services are available on TCP port 34611 :

- program: 100024 (status), version: 1

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/37814/rpc-nlockmgr


The following RPC services are available on UDP port 37814 :

- program: 100021 (nlockmgr), version: 1
- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/38900/rpc-mountd


The following RPC services are available on UDP port 38900 :

- program: 100005 (mountd), version: 2

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/39079/rpc-mountd


The following RPC services are available on TCP port 39079 :

- program: 100005 (mountd), version: 1

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/39117/rpc-mountd


The following RPC services are available on TCP port 39117 :

- program: 100005 (mountd), version: 2

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/41770/rpc-mountd


The following RPC services are available on UDP port 41770 :

- program: 100005 (mountd), version: 3

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/42541/rpc-status


The following RPC services are available on UDP port 42541 :

- program: 100024 (status), version: 1

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/45785/rpc-nlockmgr


The following RPC services are available on TCP port 45785 :

- program: 100021 (nlockmgr), version: 1
- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

tcp/58531/rpc-mountd


The following RPC services are available on TCP port 58531 :

- program: 100005 (mountd), version: 3

11111 - RPC Services Enumeration
-
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

udp/58635/rpc-mountd


The following RPC services are available on UDP port 58635 :

- program: 100005 (mountd), version: 1

53335 - RPC portmapper (TCP)
-
Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/04/08, Modified: 2011/08/29
Plugin Output

tcp/111/rpc-portmapper

10223 - RPC portmapper Service Detection
-
Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
CVSS v3.0 Base Score
0.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
CVSS v2.0 Base Score
0.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:N)
References
Plugin Information
Published: 1999/08/19, Modified: 2019/10/04
Plugin Output

udp/111/rpc-portmapper

100635 - Redis Server Detection
-
Synopsis
A document-oriented database system is running on the remote host.
Description
Redis, a document-oriented database system, is running on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/06/06, Modified: 2025/07/14
Plugin Output

tcp/6379/redis_server


Version : 7.0.15

10263 - SMTP Server Detection
-
Synopsis
An SMTP server is listening on the remote port.
Description
The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
Solution
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0932
Plugin Information
Published: 1999/10/12, Modified: 2020/09/22
Plugin Output

tcp/25/smtp


Remote SMTP server banner :

220 debian ESMTP Postfix (Debian/GNU)

35296 - SNMP Protocol Version Detection
-
Synopsis
This plugin reports the protocol version negotiated with the remote SNMP agent.
Description
By sending an SNMP 'get-next-request', it is possible to determine the protocol version of the remote SNMP agent.
See Also
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2009/01/06, Modified: 2019/11/22
Plugin Output

udp/161/snmp


Nessus has negotiated SNMP communications at SNMPv2c.
19763 - SNMP Query Installed Software Disclosure
-
Synopsis
The list of software installed on the remote host can be obtained via SNMP.
Description
It is possible to obtain the list of installed software on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.25.6.3.1.2

An attacker may use this information to gain more knowledge about the target host.
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2005/09/20, Modified: 2023/11/08
Plugin Output

udp/161/snmp


accountsservice_22.08.8-6_amd64
acl_2.3.1-3_amd64
adduser_3.134_all
adwaita-icon-theme_43-1_all
aisleriot_1:3.22.23-1_amd64
alsa-topology-conf_1.2.5.1-2_all
alsa-ucm-conf_1.2.8-1_all
alsa-utils_1.2.8-1_amd64
anacron_2.3-36_amd64
apache2_2.4.62-1~deb12u2_amd64
apache2-bin_2.4.62-1~deb12u2_amd64
apache2-data_2.4.62-1~deb12u2_all
apache2-utils_2.4.62-1~deb12u2_amd64
apg_2.2.3.dfsg.1-5+b2_amd64
apparmor_3.0.8-3_amd64
appstream_0.16.1-2_amd64
apt_2.6.1_amd64
apt-config-icons_0.16.1-2_all
apt-listchanges_3.24_all
apt-utils_2.6.1_amd64
aspell_0.60.8-4+b1_amd64
aspell-en_2020.12.07-0-1_all
at-spi2-common_2.46.0-5_all
at-spi2-core_2.46.0-5_amd64
attr_1:2.5.1-4_amd64
autoconf_2.71-3_all
automake_1:1.16.5-1.3_all
autopoint_0.21-12_all
autotools-dev_20220109.1_all
avahi-daemon_0.8-10+deb12u1_amd64
baobab_43.0-1_amd64
base-files_12.4+deb12u9_amd64
base-passwd_3.6.1_amd64
bash_5.2.15-2+b7_amd64
bash-completion_1:2.11-6_all
bc_1.07.1-3+b1_amd64
bind9_1:9.18.28-1~deb12u2_amd64
bind9-dnsutils_1:9.18.28-1~deb12u2_amd64
bind9-doc_1:9.18.28-1~deb12u2_all
bind9-host_1:9.18.28-1~deb12u2_amd64
bind9-libs_1:9.18.28-1~deb12u2_amd64
bind9-utils_1:9.18.28-1~deb12u2_amd64
bind9utils_1:9.18.28-1~deb12u2_all
binutils_2.40-2_amd64
binutils-common_2.40-2_amd64
binutils-x86-64-linux-gnu_2.40-2_amd64
bluez_5.66-1+deb12u2_amd64
bluez-obexd_5.66-1+deb12u2_amd64
bogofilter_1.2.5-1+b2_amd64
bogofilter-bdb_1.2.5-1+b2_amd64
bogofilter-common_1.2.5-1+b2_amd64
bolt_0.9.5-1_amd64
brasero-common_3.12.3-2_all
bsdextrautils_2.38.1-5+deb12u3_amd64
bsdutils_1:2.38.1-5+deb12u3_amd64
bubblewrap_0.8.0-2+deb12u1_amd64
build-essential_12.9_amd64
busybox_1:1.35.0-4+b3_amd64
bzip2_1.0.8-5+b1_amd64
ca-certificates_20230311_all
ca-certificates-java_20230710~deb12u1_all
cdrdao_1:1.2.4-3_amd64
cgroupfs-mount_1.4_all
cheese_43.0-1_amd64
cheese-common_43.0-1_all
chrome-gnome-shell_42.1-3_all
cifs-utils_2:7.0-2_amd64
coinor-libcbc3_2.10.8+ds1-1_amd64
coinor-libcgl1_0.60.3+repack1-4_amd64
coinor-libclp1_1.17.6-3_amd64
coinor-libcoinmp1v5_1.8.3-3_amd64
coinor-libcoinutils3v5_2.11.4+repack1-2_amd64
coinor-libosi1v5_0.108.6+repack1-2_amd64
colord_1.4.6-2.2_amd64
colord-data_1.4.6-2.2_all
console-setup_1.221_all
console-setup-linux_1.221_all
containerd_1.6.20~ds1-1+b1_amd64
containerd.io_1.7.27-1_amd64
coreutils_9.1-1_amd64
cpio_2.13+dfsg-7.1_amd64
cpp_4:12.2.0-3_amd64
cpp-12_12.2.0-14_amd64
cracklib-runtime_2.9.6-5+b1_amd64
criu_3.17.1-2+deb12u1_amd64
cron_3.0pl1-162_amd64
cron-daemon-common_3.0pl1-162_all
cups_2.4.2-3+deb12u8_amd64
cups-browsed_1.28.17-3+deb12u1_amd64
cups-client_2.4.2-3+deb12u8_amd64
cups-common_2.4.2-3+deb12u8_all
cups-core-drivers_2.4.2-3+deb12u8_amd64
cups-daemon_2.4.2-3+deb12u8_amd64
cups-filters_1.28.17-3+deb12u1_amd64
cups-filters-core-drivers_1.28.17-3+deb12u1_amd64
cups-ipp-utils_2.4.2-3+deb12u8_amd64
cups-pk-helper_0.2.6-1+b1_amd64
cups-ppdc_2.4.2-3+deb12u8_amd64
cups-server-common_2.4.2-3+deb12u8_all
curl_7.88.1-10+deb12u12_amd64
dash_0.5.12-2_amd64
dbus_1.14.10-1~deb12u1_amd64
dbus-bin_1.14.10-1~deb12u1_amd64
dbus-daemon_1.14.10-1~deb12u1_amd64
dbus-session-bus-common_1.14.10-1~deb12u1_all
dbus-system-bus-common_1.14.10-1~deb12u1_all
dbus-user-session_1.14.10-1~deb12u1_amd64
dconf-cli_0.40.0-4_amd64
dconf-gsettings-backend_0.40.0-4_amd64
dconf-service_0.40.0-4_amd64
dctrl-tools_2.24-3+b1_amd64
debconf_1.5.82_all
debconf-i18n_1.5.82_all
debhelper_13.11.4_all
debian-archive-keyring_2023.3+deb12u1_all
debian-faq_11.1_all
debian-keyring_2022.12.24_all
debianutils_5.7-0.5~deb12u1_amd64
default-jre_2:1.17-74_amd64
default-jre-headless_2:1.17-74_amd64
desktop-base_12.0.6+nmu1~deb12u1_all
desktop-file-utils_0.26-1_amd64
devscripts_2.23.4+deb12u2_amd64
dh-autoreconf_20_all
dh-strip-nondeterminism_1.13.1-1_all
dictionaries-common_1.29.5_all
diffstat_1.65-1_amd64
diffutils_1:3.8-4_amd64
dirmngr_2.2.40-1.1_amd64
discover_2.1.2-10_amd64
discover-data_2.2013.01.13_all
distro-info-data_0.58+deb12u3_all
dmidecode_3.4-1_amd64
dmsetup_2:1.02.185-2_amd64
dns-root-data_2024041801~deb12u1_all
dnsmasq-base_2.90-4~deb12u1_amd64
doc-debian_11.3+nmu1_all
docbook-xml_4.5-12_all
docker-buildx-plugin_0.23.0-1~debian.12~bookworm_amd64
docker-ce_5:28.1.1-1~debian.12~bookworm_amd64
docker-ce-cli_5:28.1.1-1~debian.12~bookworm_amd64
docker-ce-rootless-extras_5:28.1.1-1~debian.12~bookworm_amd64
docker-compose-plugin_2.35.1-1~debian.12~bookworm_amd64
docker.io_20.10.24+dfsg1-1+deb12u1_amd64
dosfstools_4.2-1_amd64
dpkg_1.21.22_amd64
dpkg-dev_1.21.22_all
dput_1.1.3_all
dvisvgm_3.0.3-1_amd64
dwz_0.15-1_amd64
e2fsprogs_1.47.0-2_amd64
easy-rsa_3.1.0-1_all
efibootmgr_17-2_amd64
eject_2.38.1-5+deb12u3_amd64
emacsen-common_3.0.5_all
enchant-2_2.3.3-2_amd64
eog_43.2-1_amd64
equivs_2.3.1_all
espeak-ng-data_1.51+dfsg-10+deb12u2_amd64
evince_43.1-2+b1_amd64
evince-common_43.1-2_all
evolution_3.46.4-2_amd64
evolution-common_3.46.4-2_all
evolution-data-server_3.46.4-2_amd64
evolution-data-server-common_3.46.4-2_all
evolution-plugin-bogofilter_3.46.4-2_amd64
evolution-plugin-pstimport_3.46.4-2_amd64
evolution-plugins_3.46.4-2_amd64
exfatprogs_1.2.0-1+deb12u1_amd64
fakeroot_1.31-1.2_amd64
fdisk_2.38.1-5+deb12u3_amd64
file_1:5.44-3_amd64
file-roller_43.0-1_amd64
findutils_4.9.0-4_amd64
firefox-esr_128.5.0esr-1~deb12u1_amd64
firmware-linux-free_20200122-1_all
five-or-more_1:3.32.3-1_amd64
folks-common_0.15.5-2_all
fontconfig_2.14.1-4_amd64
fontconfig-config_2.14.1-4_amd64
fonts-cantarell_0.303.1-1_all
fonts-dejavu_2.37-6_all
fonts-dejavu-core_2.37-6_all
fonts-dejavu-extra_2.37-6_all
fonts-droid-fallback_1:6.0.1r16-1.1_all
fonts-font-awesome_5.0.10+really4.7.0~dfsg-4.1_all
fonts-lato_2.0-2.1_all
fonts-liberation2_2.1.5-1_all
fonts-lmodern_2.005-1_all
fonts-noto-color-emoji_2.042-0+deb12u1_all
fonts-noto-mono_20201225-1_all
fonts-opensymbol_4:102.12+LibO7.4.7-1+deb12u5_all
fonts-quicksand_0.2016-2.1_all
fonts-symbola_2.60-1.1_all
fonts-texgyre_20180621-6_all
fonts-texgyre-math_20180621-6_all
fonts-urw-base35_20200910-7_all
four-in-a-row_1:3.38.1-1+b1_amd64
ftp_20210827-4_all
fuse3_3.14.0-4_amd64
fwupd_1.8.12-2_amd64
fwupd-amd64-signed_1:1.4+1_amd64
g++_4:12.2.0-3_amd64
g++-12_12.2.0-14_amd64
galera-4_26.4.20-0+deb12u1_amd64
gawk_1:5.2.1-2_amd64
gcc_4:12.2.0-3_amd64
gcc-12_12.2.0-14_amd64
gcc-12-base_12.2.0-14_amd64
gcr_3.41.1-1+b1_amd64
gdisk_1.0.9-2.1_amd64
gdm3_43.0-3_amd64
geoclue-2.0_2.6.0-2+deb12u1_amd64
geocode-glib-common_3.26.3-6_all
gettext_0.21-12_amd64
gettext-base_0.21-12_amd64
ghostscript_10.0.0~dfsg-11+deb12u6_amd64
gir1.2-accountsservice-1.0_22.08.8-6_amd64
gir1.2-adw-1_1.2.2-1_amd64
gir1.2-atk-1.0_2.46.0-5_amd64
gir1.2-atspi-2.0_2.46.0-5_amd64
gir1.2-clutter-1.0_1.26.4+dfsg-4_amd64
gir1.2-cogl-1.0_1.22.8-3+b1_amd64
gir1.2-coglpango-1.0_1.22.8-3+b1_amd64
gir1.2-evince-3.0_43.1-2+b1_amd64
gir1.2-freedesktop_1.74.0-3_amd64
gir1.2-gck-1_3.41.1-1+b1_amd64
gir1.2-gcr-3_3.41.1-1+b1_amd64
gir1.2-gdesktopenums-3.0_43.0-1_amd64
gir1.2-gdkpixbuf-2.0_2.42.10+dfsg-1+deb12u1_amd64
gir1.2-gdm-1.0_43.0-3_amd64
gir1.2-geoclue-2.0_2.6.0-2+deb12u1_amd64
gir1.2-geocodeglib-2.0_3.26.3-6_amd64
gir1.2-glib-2.0_1.74.0-3_amd64
gir1.2-gmenu-3.0_3.36.0-1.1_amd64
gir1.2-gnomebluetooth-3.0_42.5-3_amd64
gir1.2-gnomedesktop-3.0_43.2-2_amd64
gir1.2-gnomedesktop-4.0_43.2-2_amd64
gir1.2-goa-1.0_3.46.0-1_amd64
gir1.2-graphene-1.0_1.10.8-1_amd64
gir1.2-grilo-0.3_0.3.15-1_amd64
gir1.2-gst-plugins-bad-1.0_1.22.0-4+deb12u5_amd64
gir1.2-gst-plugins-base-1.0_1.22.0-3+deb12u4_amd64
gir1.2-gstreamer-1.0_1.22.0-2+deb12u1_amd64
gir1.2-gtk-3.0_3.24.38-2~deb12u3_amd64
gir1.2-gtk-4.0_4.8.3+ds-2+deb12u1_amd64
gir1.2-gtkclutter-1.0_1.8.4-4+b1_amd64
gir1.2-gtksource-4_4.8.4-4_amd64
gir1.2-gweather-4.0_4.2.0-2_amd64
gir1.2-handy-1_1.8.1-1_amd64
gir1.2-harfbuzz-0.0_6.0.0+dfsg-3_amd64
gir1.2-ibus-1.0_1.5.27-5_amd64
gir1.2-javascriptcoregtk-4.0_2.46.5-1~deb12u1_amd64
gir1.2-javascriptcoregtk-4.1_2.46.5-1~deb12u1_amd64
gir1.2-json-1.0_1.6.6-1_amd64
gir1.2-malcontent-0_0.11.0-4_amd64
gir1.2-mediaart-2.0_1.9.6-1_amd64
gir1.2-mutter-11_43.8-0+deb12u1_amd64
gir1.2-nm-1.0_1.42.4-1_amd64
gir1.2-nma-1.0_1.10.6-1_amd64
gir1.2-notify-0.7_0.8.1-1_amd64
gir1.2-packagekitglib-1.0_1.2.6-5_amd64
gir1.2-pango-1.0_1.50.12+ds-1_amd64
gir1.2-peas-1.0_1.34.0-1+b1_amd64
gir1.2-polkit-1.0_122-3_amd64
gir1.2-rb-3.0_3.4.6-2+b1_amd64
gir1.2-rest-1.0_0.9.1-6_amd64
gir1.2-rsvg-2.0_2.54.7+dfsg-1~deb12u1_amd64
gir1.2-secret-1_0.20.5-3_amd64
gir1.2-shumate-1.0_1.0.3-2_amd64
gir1.2-soup-2.4_2.74.3-1+deb12u1_amd64
gir1.2-soup-3.0_3.2.2-2_amd64
gir1.2-totem-1.0_43.0-2_amd64
gir1.2-totemplparser-1.0_3.26.6-1+b1_amd64
gir1.2-tracker-3.0_3.4.2-1_amd64
gir1.2-upowerglib-1.0_0.99.20-2_amd64
gir1.2-webkit2-4.0_2.46.5-1~deb12u1_amd64
gir1.2-webkit2-4.1_2.46.5-1~deb12u1_amd64
gir1.2-wnck-3.0_43.0-3_amd64
git_1:2.39.5-0+deb12u2_amd64
git-man_1:2.39.5-0+deb12u2_all
gjs_1.74.2-1+deb12u1_amd64
gkbd-capplet_3.28.1-1_amd64
glib-networking_2.74.0-4_amd64
glib-networking-common_2.74.0-4_all
glib-networking-services_2.74.0-4_amd64
gnome_1:43+1_amd64
gnome-2048_3.38.2-3_amd64
gnome-accessibility-themes_3.28-2_all
gnome-backgrounds_43.1-1_all
gnome-bluetooth-3-common_42.5-3_all
gnome-bluetooth-sendto_42.5-3_amd64
gnome-browser-connector_42.1-3_all
gnome-calculator_1:43.0.1-2_amd64
gnome-calendar_43.1-2_amd64
gnome-characters_43.1-1+deb12u1_amd64
gnome-chess_1:43.1-1_amd64
gnome-clocks_43.0-1_amd64
gnome-color-manager_3.36.0-1+b1_amd64
gnome-contacts_43.1-1_amd64
gnome-control-center_1:43.6-2~deb12u1_amd64
gnome-control-center-data_1:43.6-2~deb12u1_all
gnome-core_1:43+1_amd64
gnome-desktop3-data_43.2-2_all
gnome-disk-utility_43.0-1_amd64
gnome-font-viewer_43.0-1_amd64
gnome-games_1:43+1_all
gnome-icon-theme_3.12.0-5_all
gnome-initial-setup_43.2-6_amd64
gnome-keyring_42.1-1+b2_amd64
gnome-keyring-pkcs11_42.1-1+b2_amd64
gnome-klotski_1:3.38.2-1_amd64
gnome-logs_43.0-1_amd64
gnome-mahjongg_1:3.38.3-2_amd64
gnome-maps_43.5-2~deb12u1_amd64
gnome-menus_3.36.0-1.1_amd64
gnome-mines_1:40.1-1_amd64
gnome-music_42.1-1_amd64
gnome-nibbles_1:3.38.2-2+b1_amd64
gnome-online-accounts_3.46.0-1_amd64
gnome-remote-desktop_43.3-1_amd64
gnome-robots_1:40.0-2_amd64
gnome-session_43.0-1+deb12u1_all
gnome-session-bin_43.0-1+deb12u1_amd64
gnome-session-common_43.0-1+deb12u1_all
gnome-settings-daemon_43.0-4_amd64
gnome-settings-daemon-common_43.0-4_all
gnome-shell_43.9-0+deb12u2_amd64
gnome-shell-common_43.9-0+deb12u2_all
gnome-shell-extension-prefs_43.9-0+deb12u2_amd64
gnome-shell-extensions_43.1-1_all
gnome-software_43.5-1~deb12u1_amd64
gnome-software-common_43.5-1~deb12u1_all
gnome-sound-recorder_43~beta-1_all
gnome-sudoku_1:43.1-1_amd64
gnome-sushi_43.0-2_amd64
gnome-system-monitor_42.0-2_amd64
gnome-taquin_3.38.1-2+b1_amd64
gnome-terminal_3.46.8-1_amd64
gnome-terminal-data_3.46.8-1_all
gnome-tetravex_1:3.38.2-3_amd64
gnome-text-editor_43.2-1_amd64
gnome-themes-extra_3.28-2_amd64
gnome-themes-extra-data_3.28-2_all
gnome-tweaks_42~beta-4_all
gnome-user-docs_43.0-2_all
gnome-user-share_43.0-1_amd64
gnome-video-effects_0.5.0-1_all
gnome-weather_43.0-1_all
gnupg_2.2.40-1.1_all
gnupg-l10n_2.2.40-1.1_all
gnupg-utils_2.2.40-1.1_amd64
gpg_2.2.40-1.1_amd64
gpg-agent_2.2.40-1.1_amd64
gpg-wks-client_2.2.40-1.1_amd64
gpg-wks-server_2.2.40-1.1_amd64
gpgconf_2.2.40-1.1_amd64
gpgsm_2.2.40-1.1_amd64
gpgv_2.2.40-1.1_amd64
grep_3.8-5_amd64
grilo-plugins-0.3_0.3.15-2_amd64
groff-base_1.22.4-10_amd64
grub-common_2.06-13+deb12u1_amd64
grub-efi-amd64_2.06-13+deb12u1_amd64
grub-efi-amd64-bin_2.06-13+deb12u1_amd64
grub-efi-amd64-signed_1+2.06+13+deb12u1_amd64
grub2-common_2.06-13+deb12u1_amd64
gsettings-desktop-schemas_43.0-1_all
gsfonts_2:20200910-7_all
gstreamer1.0-clutter-3.0_3.0.27-3_amd64
gstreamer1.0-gl_1.22.0-3+deb12u4_amd64
gstreamer1.0-gtk3_1.22.0-5+deb12u2_amd64
gstreamer1.0-libav_1.22.0-2_amd64
gstreamer1.0-packagekit_1.2.6-5_amd64
gstreamer1.0-pipewire_0.3.65-3+deb12u1_amd64
gstreamer1.0-plugins-bad_1.22.0-4+deb12u5_amd64
gstreamer1.0-plugins-base_1.22.0-3+deb12u4_amd64
gstreamer1.0-plugins-good_1.22.0-5+deb12u2_amd64
gstreamer1.0-plugins-ugly_1.22.0-2+deb12u1_amd64
gstreamer1.0-x_1.22.0-3+deb12u4_amd64
gtk-update-icon-cache_3.24.38-2~deb12u3_amd64
gtk2-engines-pixbuf_2.24.33-2+deb12u1_amd64
guile-3.0-libs_3.0.8-2_amd64
gvfs_1.50.3-1_amd64
gvfs-backends_1.50.3-1_amd64
gvfs-common_1.50.3-1_all
gvfs-daemons_1.50.3-1_amd64
gvfs-fuse_1.50.3-1_amd64
gvfs-libs_1.50.3-1_amd64
gzip_1.12-1_amd64
hicolor-icon-theme_0.17-2_all
hitori_3.38.4-2_amd64
hoichess_0.22.0-3_amd64
hostname_3.23+nmu1_amd64
hunspell-en-us_1:2020.12.07-2_all
hyphen-en-us_2.8.8-7_all
i965-va-driver_2.4.1+dfsg1-1_amd64
iagno_1:3.38.1-2_amd64
iamerican_3.4.05-1_all
ibritish_3.4.05-1_all
ibus_1.5.27-5_amd64
ibus-data_1.5.27-5_all
ibus-gtk_1.5.27-5_amd64
ibus-gtk3_1.5.27-5_amd64
ibus-gtk4_1.5.27-5_amd64
ibverbs-providers_44.0-2_amd64
ienglish-common_3.4.05-1_all
ifupdown_0.8.41_amd64
iio-sensor-proxy_3.0-2_amd64
im-config_0.55-2_all
imagemagick-6-common_8:6.9.11.60+dfsg-1.6+deb12u2_all
inetutils-telnet_2:2.4-2+deb12u1_amd64
init_1.65.2_amd64
init-system-helpers_1.65.2_all
initramfs-tools_0.142+deb12u1_all
initramfs-tools-core_0.142+deb12u1_all
installation-report_2.89_all
intel-media-va-driver_23.1.1+dfsg1-1_amd64
intel-microcode_3.20241112.1~deb12u1_amd64
intltool-debian_0.35.0+20060710.6_all
ipp-usb_0.9.23-1+b4_amd64
iproute2_6.1.0-3_amd64
iptables_1.8.9-2_amd64
iptables-persistent_1.0.20_all
iputils-ping_3:20221126-1+deb12u1_amd64
isc-dhcp-client_4.4.3-P1-2_amd64
isc-dhcp-common_4.4.3-P1-2_amd64
iso-codes_4.15.0-1_all
ispell_3.4.05-1_amd64
iucode-tool_2.3.1-3_amd64
iw_5.19-1_amd64
java-common_0.74_all
javascript-common_11+nmu1_all
jq_1.6-2.1_amd64
kbd_2.5.1-1+b1_amd64
keepassxc_2.7.4+dfsg.1-2_amd64
keyboard-configuration_1.221_all
keyutils_1.6.3-2_amd64
klibc-utils_2.0.12-1_amd64
kmod_30+20221128-1_amd64
krb5-locales_1.20.1-2+deb12u2_all
laptop-detect_0.16_all
less_590-2.1~deb12u2_amd64
liba52-0.7.4_0.7.4-20_amd64
libaa1_1.4p5-50_amd64
libaacs0_0.11.1-2_amd64
libabsl20220623_20220623.1-1_amd64
libabw-0.1-1_0.1.3-1_amd64
libaccountsservice0_22.08.8-6_amd64
libacl1_2.3.1-3_amd64
libadwaita-1-0_1.2.2-1_amd64
libalgorithm-diff-perl_1.201-1_all
libalgorithm-diff-xs-perl_0.04-8+b1_amd64
libalgorithm-merge-perl_0.08-5_all
libaliased-perl_0.34-3_all
libao-common_1.2.2+20180113-1.1_all
libao4_1.2.2+20180113-1.1_amd64
libaom3_3.6.0-1+deb12u1_amd64
libapache-pom-java_29-2_all
libapache2-mod-dnssd_0.6-4_amd64
libapache2-mod-php_2:8.2+93_all
libapache2-mod-php8.2_8.2.26-1~deb12u1_amd64
libapparmor1_3.0.8-3_amd64
libappstream4_0.16.1-2_amd64
libapr1_1.7.2-3+deb12u1_amd64
libaprutil1_1.6.3-1_amd64
libaprutil1-dbd-sqlite3_1.6.3-1_amd64
libaprutil1-ldap_1.6.3-1_amd64
libapt-pkg-perl_0.1.40+b2_amd64
libapt-pkg6.0_2.6.1_amd64
libarchive-cpio-perl_0.10-3_all
libarchive-zip-perl_1.68-1_all
libarchive13_3.6.2-1+deb12u2_amd64
libargon2-1_0~20171227-0.3+deb12u1_amd64
libarray-intspan-perl_2.004-2_all
libasan8_12.2.0-14_amd64
libasound2_1.2.8-1+b1_amd64
libasound2-data_1.2.8-1_all
libaspell15_0.60.8-4+b1_amd64
libass9_1:0.17.1-1_amd64
libassuan0_2.5.5-5_amd64
libasyncns0_0.8-6+b3_amd64
libatasmart4_0.19-5_amd64
libatk-adaptor_2.46.0-5_amd64
libatk-bridge2.0-0_2.46.0-5_amd64
libatk-wrapper-java_0.40.0-3_all
libatk-wrapper-java-jni_0.40.0-3_amd64
libatk1.0-0_2.46.0-5_amd64
libatkmm-1.6-1v5_2.28.3-1_amd64
libatomic1_12.2.0-14_amd64
libatopology2_1.2.8-1+b1_amd64
libatspi2.0-0_2.46.0-5_amd64
libattr1_1:2.5.1-4_amd64
libaudio2_1.9.4-7_amd64
libaudit-common_1:3.0.9-1_all
libaudit1_1:3.0.9-1_amd64
libauthen-sasl-perl_2.1600-3_all
libavahi-client3_0.8-10+deb12u1_amd64
libavahi-common-data_0.8-10+deb12u1_amd64
libavahi-common3_0.8-10+deb12u1_amd64
libavahi-core7_0.8-10+deb12u1_amd64
libavahi-glib1_0.8-10+deb12u1_amd64
libavc1394-0_0.5.4-5_amd64
libavcodec59_7:5.1.6-0+deb12u1_amd64
libavfilter8_7:5.1.6-0+deb12u1_amd64
libavformat59_7:5.1.6-0+deb12u1_amd64
libavif15_0.11.1-1_amd64
libavutil57_7:5.1.6-0+deb12u1_amd64
libayatana-appindicator3-1_0.5.92-1_amd64
libayatana-ido3-0.4-0_0.9.3-1_amd64
libayatana-indicator3-7_0.9.3-1_amd64
libb-hooks-endofscope-perl_0.26-1_all
libb-hooks-op-check-perl_0.22-2+b1_amd64
libbdplus0_0.2.0-3_amd64
libberkeleydb-perl_0.64-2+b1_amd64
libbinutils_2.40-2_amd64
libbit-vector-perl_7.4-2+b1_amd64
libblas3_3.11.0-2_amd64
libblkid1_2.38.1-5+deb12u3_amd64
libblockdev-crypto2_2.28-2_amd64
libblockdev-fs2_2.28-2_amd64
libblockdev-loop2_2.28-2_amd64
libblockdev-part-err2_2.28-2_amd64
libblockdev-part2_2.28-2_amd64
libblockdev-swap2_2.28-2_amd64
libblockdev-utils2_2.28-2_amd64
libblockdev2_2.28-2_amd64
libbluetooth3_5.66-1+deb12u2_amd64
libbluray2_1:1.3.4-1_amd64
libboost-filesystem1.74.0_1.74.0+ds1-21_amd64
libboost-iostreams1.74.0_1.74.0+ds1-21_amd64
libboost-locale1.74.0_1.74.0+ds1-21_amd64
libboost-thread1.74.0_1.74.0+ds1-21_amd64
libbotan-2-19_2.19.3+dfsg-1_amd64
libbox2d2_2.4.1-3_amd64
libbpf1_1:1.1.0-1_amd64
libbrasero-media3-1_3.12.3-2_amd64
libbrlapi0.8_6.5-7+deb12u1_amd64
libbrotli1_1.0.9-2+b6_amd64
libbs2b0_3.1.0+dfsg-7_amd64
libbsd0_0.11.7-2_amd64
libburn4_1.5.4-1_amd64
libbz2-1.0_1.0.8-5+b1_amd64
libc-bin_2.36-9+deb12u9_amd64
libc-dev-bin_2.36-9+deb12u9_amd64
libc-devtools_2.36-9+deb12u9_amd64
libc-l10n_2.36-9+deb12u9_all
libc6_2.36-9+deb12u9_amd64
libc6-dev_2.36-9+deb12u9_amd64
libcaca0_0.99.beta20-3_amd64
libcairo-gobject-perl_1.005-4_amd64
libcairo-gobject2_1.16.0-7_amd64
libcairo-perl_1.109-3+b1_amd64
libcairo-script-interpreter2_1.16.0-7_amd64
libcairo2_1.16.0-7_amd64
libcairomm-1.0-1v5_1.14.4-2_amd64
libcamel-1.2-64_3.46.4-2_amd64
libcanberra-gtk3-0_0.30-10_amd64
libcanberra-gtk3-module_0.30-10_amd64
libcanberra-pulse_0.30-10_amd64
libcanberra0_0.30-10_amd64
libcap-ng0_0.8.3-1+b3_amd64
libcap2_1:2.66-4_amd64
libcap2-bin_1:2.66-4_amd64
libcapture-tiny-perl_0.48-2_all
libcarp-clan-perl_6.08-2_all
libcbor0.8_0.8.0-2+b1_amd64
libcc1-0_12.2.0-14_amd64
libccid_1.5.2-1_amd64
libcdio-cdda2_10.2+2.0.1-1_amd64
libcdio-paranoia2_10.2+2.0.1-1_amd64
libcdio19_2.1.0-4_amd64
libcdparanoia0_3.10.2+debian-14_amd64
libcdr-0.1-1_0.1.6-2+b2_amd64
libcephfs2_16.2.15+ds-0+deb12u1_amd64
libcgi-fast-perl_1:2.15-1_all
libcgi-pm-perl_4.55-1_all
libcheese-gtk25_43.0-1_amd64
libcheese8_43.0-1_amd64
libchromaprint1_1.5.1-2+b1_amd64
libcjson1_1.7.15-1+deb12u2_amd64
libclass-data-inheritable-perl_0.08-3_all
libclass-inspector-perl_1.36-3_all
libclass-method-modifiers-perl_2.14-1_all
libclass-xsaccessor-perl_1.19-4+b1_amd64
libclone-perl_0.46-1_amd64
libcloudproviders0_0.3.1-2_amd64
libclucene-contribs1v5_2.3.3.4+dfsg-1.1_amd64
libclucene-core1v5_2.3.3.4+dfsg-1.1_amd64
libclutter-1.0-0_1.26.4+dfsg-4_amd64
libclutter-1.0-common_1.26.4+dfsg-4_all
libclutter-gst-3.0-0_3.0.27-3_amd64
libclutter-gtk-1.0-0_1.8.4-4+b1_amd64
libcmark0.30.2_0.30.2-6_amd64
libcodec2-1.0_1.0.5-1_amd64
libcogl-common_1.22.8-3_all
libcogl-pango20_1.22.8-3+b1_amd64
libcogl-path20_1.22.8-3+b1_amd64
libcogl20_1.22.8-3+b1_amd64
libcolamd2_1:5.12.0+dfsg-2_amd64
libcolord-gtk4-1_0.3.0-3.1_amd64
libcolord2_1.4.6-2.2_amd64
libcolorhug2_1.4.6-2.2_amd64
libcom-err2_1.47.0-2_amd64
libcommon-sense-perl_3.75-3_amd64
libcommons-logging-java_1.2-3_all
libcommons-parent-java_56-1_all
libconfig-inifiles-perl_3.000003-2_all
libconfig-tiny-perl_2.28-2_all
libconst-fast-perl_0.014-2_all
libcontextual-return-perl_0.004014-4_all
libconvert-binhex-perl_1.125-3_all
libcpanel-json-xs-perl_4.35-1_amd64
libcrack2_2.9.6-5+b1_amd64
libcrypt-dev_1:4.4.33-2_amd64
libcrypt-rc4-perl_2.02-5_all
libcrypt1_1:4.4.33-2_amd64
libcryptsetup12_2:2.6.1-4~deb12u2_amd64
libctf-nobfd0_2.40-2_amd64
libctf0_2.40-2_amd64
libcue2_2.2.1-4+deb12u1_amd64
libcups2_2.4.2-3+deb12u8_amd64
libcupsfilters1_1.28.17-3+deb12u1_amd64
libcurl3-gnutls_7.88.1-10+deb12u12_amd64
libcurl4_7.88.1-10+deb12u12_amd64
libdaemon0_0.14-7.1_amd64
libdata-dpath-perl_0.58-2_all
libdata-dump-perl_1.25-1_all
libdata-messagepack-perl_1.02-1+b1_amd64
libdata-optlist-perl_0.113-1_all
libdata-validate-domain-perl_0.10-1.1_all
libdata-validate-ip-perl_0.31-1_all
libdata-validate-uri-perl_0.07-2_all
libdate-calc-perl_6.4-2_all
libdate-calc-xs-perl_6.4-2+b1_amd64
libdate-manip-perl_6.91-1_all
libdatrie1_0.2.13-2+b1_amd64
libdav1d6_1.0.0-2+deb12u1_amd64
libdaxctl1_76.1-1_amd64
libdb5.3_5.3.28+dfsg2-1_amd64
libdbd-mariadb-perl_1.22-1+b1_amd64
libdbi-perl_1.643-4_amd64
libdbus-1-3_1.14.10-1~deb12u1_amd64
libdbusmenu-glib4_18.10.20180917~bzr492+repack1-3_amd64
libdbusmenu-gtk3-4_18.10.20180917~bzr492+repack1-3_amd64
libdc1394-25_2.2.6-4_amd64
libdca0_0.0.7-2_amd64
libdconf1_0.40.0-4_amd64
libde265-0_1.0.11-1+deb12u2_amd64
libdebconfclient0_0.270_amd64
libdebhelper-perl_13.11.4_all
libdecor-0-0_0.1.1-2_amd64
libdecor-0-plugin-1-cairo_0.1.1-2_amd64
libdee-1.0-4_1.2.7+17.10.20170616-7+b2_amd64
libdeflate0_1.14-1_amd64
libdevel-callchecker-perl_0.008-2_amd64
libdevel-size-perl_0.83-2+b1_amd64
libdevel-stacktrace-perl_2.0400-2_all
libdevmapper1.02.1_2:1.02.185-2_amd64
libdigest-perl-md5-perl_1.9-5_all
libdirectfb-1.7-7_1.7.7-11_amd64
libdiscover2_2.1.2-10_amd64
libdistro-info-perl_1.5+deb12u1_all
libdjvulibre-text_3.5.28-2_all
libdjvulibre21_3.5.28-2+b1_amd64
libdmapsharing-3.0-2_2.9.41-3+b1_amd64
libdotconf0_1.3-0.3_amd64
libdouble-conversion3_3.2.1-1_amd64
libdpkg-perl_1.21.22_all
libdrm-amdgpu1_2.4.114-1+b1_amd64
libdrm-common_2.4.114-1_all
libdrm-intel1_2.4.114-1+b1_amd64
libdrm-nouveau2_2.4.114-1+b1_amd64
libdrm-radeon1_2.4.114-1+b1_amd64
libdrm2_2.4.114-1+b1_amd64
libduktape207_2.7.0-2_amd64
libdv4_1.0.0-15_amd64
libdvdnav4_6.1.1-1_amd64
libdvdread8_6.1.3-1_amd64
libdw1_0.188-2.1_amd64
libdynaloader-functions-perl_0.003-3_all
libe-book-0.1-1_0.1.3-2+b2_amd64
libebackend-1.2-11_3.46.4-2_amd64
libebook-1.2-21_3.46.4-2_amd64
libebook-contacts-1.2-4_3.46.4-2_amd64
libecal-2.0-2_3.46.4-2_amd64
libedata-book-1.2-27_3.46.4-2_amd64
libedata-cal-2.0-2_3.46.4-2_amd64
libedataserver-1.2-27_3.46.4-2_amd64
libedataserverui-1.2-4_3.46.4-2_amd64
libedataserverui4-1.0-0_3.46.4-2_amd64
libedit2_3.1-20221030-2_amd64
libeditorconfig0_0.12.6-0.1_amd64
libefiboot1_37-6_amd64
libefivar1_37-6_amd64
libegl-mesa0_22.3.6-1+deb12u1_amd64
libegl1_1.6.0-1_amd64
libelf1_0.188-2.1_amd64
libemail-address-xs-perl_1.05-1+b1_amd64
libenchant-2-2_2.3.3-2_amd64
libencode-locale-perl_1.05-3_all
libeot0_0.01-5+b1_amd64
libepoxy0_1.5.10-1_amd64
libept1.6.0_1.2.1_amd64
libepubgen-0.1-1_0.1.1-1_amd64
liberror-perl_0.17029-2_all
libespeak-ng1_1.51+dfsg-10+deb12u2_amd64
libetonyek-0.1-1_0.1.10-3+b1_amd64
libevdev2_1.13.0+dfsg-1_amd64
libevdocument3-4_43.1-2+b1_amd64
libevent-2.1-7_2.1.12-stable-8_amd64
libevent-core-2.1-7_2.1.12-stable-8_amd64
libevolution_3.46.4-2_amd64
libevview3-3_43.1-2+b1_amd64
libexception-class-perl_1.45-1_all
libexempi8_2.6.3-1_amd64
libexif12_0.6.24-1+b1_amd64
libexiv2-27_0.27.6-1_amd64
libexpat1_2.5.0-1+deb12u1_amd64
libexpat1-dev_2.5.0-1+deb12u1_amd64
libexporter-tiny-perl_1.006000-1_all
libext2fs2_1.47.0-2_amd64
libexttextcat-2.0-0_3.4.5-1_amd64
libexttextcat-data_3.4.5-1_all
libextutils-depends-perl_0.8001-2_all
libfaad2_2.10.1-1_amd64
libfakeroot_1.31-1.2_amd64
libfcgi-bin_2.4.2-2_amd64
libfcgi-perl_0.82+ds-2_amd64
libfcgi0ldbl_2.4.2-2_amd64
libfdisk1_2.38.1-5+deb12u3_amd64
libfeature-compat-class-perl_0.05-1_all
libfeature-compat-try-perl_0.05-1_all
libffi8_3.4.4-1_amd64
libfftw3-double3_3.3.10-1_amd64
libfftw3-single3_3.3.10-1_amd64
libfido2-1_1.12.0-2+b1_amd64
libfile-basedir-perl_0.09-2_all
libfile-chdir-perl_0.1008-1.1_all
libfile-desktopentry-perl_0.22-3_all
libfile-dirlist-perl_0.05-3_all
libfile-fcntllock-perl_0.22-4+b1_amd64
libfile-find-rule-perl_0.34-3_all
libfile-homedir-perl_1.006-2_all
libfile-listing-perl_6.15-1_all
libfile-mimeinfo-perl_0.33-1_all
libfile-stripnondeterminism-perl_1.13.1-1_all
libfile-touch-perl_0.12-2_all
libfile-which-perl_1.27-2_all
libflac12_1.4.2+ds-2_amd64
libflashrom1_1.3.0-2.1_amd64
libflatpak0_1.14.10-1~deb12u1_amd64
libflite1_2.2-5_amd64
libfluidsynth3_2.3.1-2_amd64
libfmt9_9.1.0+ds1-2_amd64
libfolks-eds26_0.15.5-2+b1_amd64
libfolks26_0.15.5-2+b1_amd64
libfont-afm-perl_1.20-4_all
libfont-ttf-perl_1.06-2_all
libfontbox-java_1:1.8.16-2_all
libfontconfig1_2.14.1-4_amd64
libfontembed1_1.28.17-3+deb12u1_amd64
libfontenc1_1:1.1.4-1_amd64
libfreeaptx0_0.1.1-2_amd64
libfreehand-0.1-1_0.1.2-3_amd64
libfreerdp-server2-2_2.10.0+dfsg1-1_amd64
libfreerdp2-2_2.10.0+dfsg1-1_amd64
libfreetype6_2.12.1+dfsg-5+deb12u3_amd64
libfreezethaw-perl_0.5001-3_all
libfribidi0_1.0.8-2.1_amd64
libfstrm0_0.6.1-1_amd64
libftdi1-2_1.5-6+b2_amd64
libfuse2_2.9.9-6+b1_amd64
libfuse3-3_3.14.0-4_amd64
libfwupd2_1.8.12-2_amd64
libgail-3-0_3.24.38-2~deb12u3_amd64
libgail-common_2.24.33-2+deb12u1_amd64
libgail18_2.24.33-2+deb12u1_amd64
libgav1-1_0.18.0-1+b1_amd64
libgbm1_22.3.6-1+deb12u1_amd64
libgc1_1:8.2.2-3_amd64
libgcab-1.0-0_1.5-1_amd64
libgcc-12-dev_12.2.0-14_amd64
libgcc-s1_12.2.0-14_amd64
libgck-1-0_3.41.1-1+b1_amd64
libgcr-base-3-1_3.41.1-1+b1_amd64
libgcr-ui-3-1_3.41.1-1+b1_amd64
libgcrypt20_1.10.1-3_amd64
libgd3_2.3.3-9_amd64
libgdata-common_0.18.1-2_all
libgdata22_0.18.1-2_amd64
libgdbm-compat4_1.23-3_amd64
libgdbm6_1.23-3_amd64
libgdk-pixbuf-2.0-0_2.42.10+dfsg-1+deb12u1_amd64
libgdk-pixbuf2.0-bin_2.42.10+dfsg-1+deb12u1_amd64
libgdk-pixbuf2.0-common_2.42.10+dfsg-1+deb12u1_all
libgdm1_43.0-3_amd64
libgee-0.8-2_0.20.6-1_amd64
libgeoclue-2-0_2.6.0-2+deb12u1_amd64
libgeocode-glib-2-0_3.26.3-6_amd64
libges-1.0-0_1.22.0-2_amd64
libgexiv2-2_0.14.0-1+b1_amd64
libgfapi0_10.3-5_amd64
libgfortran5_12.2.0-14_amd64
libgfrpc0_10.3-5_amd64
libgfxdr0_10.3-5_amd64
libgif7_5.2.1-2.5_amd64
libgirepository-1.0-1_1.74.0-3_amd64
libgit-wrapper-perl_0.048-2_all
libgitlab-api-v4-perl_0.26-3_all
libgjs0g_1.74.2-1+deb12u1_amd64
libgl1_1.6.0-1_amd64
libgl1-mesa-dri_22.3.6-1+deb12u1_amd64
libglapi-mesa_22.3.6-1+deb12u1_amd64
libgles2_1.6.0-1_amd64
libglib-object-introspection-perl_0.049-3_amd64
libglib-perl_3:1.329.3-2+b2_amd64
libglib2.0-0_2.74.6-2+deb12u5_amd64
libglib2.0-bin_2.74.6-2+deb12u5_amd64
libglib2.0-data_2.74.6-2+deb12u5_all
libglibmm-2.4-1v5_2.66.5-2_amd64
libglu1-mesa_9.0.2-1.1_amd64
libglusterfs0_10.3-5_amd64
libglvnd0_1.6.0-1_amd64
libglx-mesa0_22.3.6-1+deb12u1_amd64
libglx0_1.6.0-1_amd64
libgme0_0.6.3-6_amd64
libgmp-dev_2:6.2.1+dfsg1-1.1_amd64
libgmp10_2:6.2.1+dfsg1-1.1_amd64
libgmpxx4ldbl_2:6.2.1+dfsg1-1.1_amd64
libgnome-autoar-0-0_0.4.3-1_amd64
libgnome-autoar-gtk-0-0_0.4.3-1_amd64
libgnome-bg-4-2_43.2-2_amd64
libgnome-bluetooth-3.0-13_42.5-3_amd64
libgnome-bluetooth-ui-3.0-13_42.5-3_amd64
libgnome-desktop-3-20_43.2-2_amd64
libgnome-desktop-4-2_43.2-2_amd64
libgnome-games-support-1-3_1.8.2-1+b1_amd64
libgnome-games-support-common_1.8.2-1_all
libgnome-menu-3-0_3.36.0-1.1_amd64
libgnome-rr-4-2_43.2-2_amd64
libgnomekbd-common_3.28.1-1_all
libgnomekbd8_3.28.1-1_amd64
libgnutls-dane0_3.7.9-2+deb12u3_amd64
libgnutls-openssl27_3.7.9-2+deb12u3_amd64
libgnutls28-dev_3.7.9-2+deb12u3_amd64
libgnutls30_3.7.9-2+deb12u3_amd64
libgnutlsxx30_3.7.9-2+deb12u3_amd64
libgoa-1.0-0b_3.46.0-1_amd64
libgoa-1.0-common_3.46.0-1_all
libgoa-backend-1.0-1_3.46.0-1_amd64
libgom-1.0-0_0.4-1_amd64
libgomp1_12.2.0-14_amd64
libgpg-error0_1.46-1_amd64
libgpgme11_1.18.0-3+b1_amd64
libgpgmepp6_1.18.0-3+b1_amd64
libgphoto2-6_2.5.30-1_amd64
libgphoto2-l10n_2.5.30-1_all
libgphoto2-port12_2.5.30-1_amd64
libgpm2_1.20.7-10+b1_amd64
libgpod-common_0.8.3-17+b1_amd64
libgpod4_0.8.3-17+b1_amd64
libgprofng0_2.40-2_amd64
libgraphene-1.0-0_1.10.8-1_amd64
libgraphite2-3_1.3.14-1_amd64
libgrilo-0.3-0_0.3.15-1_amd64
libgs-common_10.0.0~dfsg-11+deb12u6_all
libgs10_10.0.0~dfsg-11+deb12u6_amd64
libgs10-common_10.0.0~dfsg-11+deb12u6_all
libgsf-1-114_1.14.50-1+deb12u1_amd64
libgsf-1-common_1.14.50-1+deb12u1_all
libgsf-bin_1.14.50-1+deb12u1_amd64
libgsl27_2.7.1+dfsg-5+deb12u1_amd64
libgslcblas0_2.7.1+dfsg-5+deb12u1_amd64
libgsm1_1.0.22-1_amd64
libgsound0_1.0.3-2_amd64
libgspell-1-2_1.12.0-1+b2_amd64
libgspell-1-common_1.12.0-1_all
libgssapi-krb5-2_1.20.1-2+deb12u2_amd64
libgssdp-1.6-0_1.6.2-2_amd64
libgstreamer-gl1.0-0_1.22.0-3+deb12u4_amd64
libgstreamer-plugins-bad1.0-0_1.22.0-4+deb12u5_amd64
libgstreamer-plugins-base1.0-0_1.22.0-3+deb12u4_amd64
libgstreamer1.0-0_1.22.0-2+deb12u1_amd64
libgtk-3-0_3.24.38-2~deb12u3_amd64
libgtk-3-bin_3.24.38-2~deb12u3_amd64
libgtk-3-common_3.24.38-2~deb12u3_all
libgtk-4-1_4.8.3+ds-2+deb12u1_amd64
libgtk-4-bin_4.8.3+ds-2+deb12u1_amd64
libgtk-4-common_4.8.3+ds-2+deb12u1_all
libgtk2.0-0_2.24.33-2+deb12u1_amd64
libgtk2.0-bin_2.24.33-2+deb12u1_amd64
libgtk2.0-common_2.24.33-2+deb12u1_all
libgtk3-perl_0.038-3_all
libgtkmm-3.0-1v5_3.24.7-1_amd64
libgtksourceview-4-0_4.8.4-4_amd64
libgtksourceview-4-common_4.8.4-4_all
libgtksourceview-5-0_5.6.2-1_amd64
libgtksourceview-5-common_5.6.2-1_all
libgtop-2.0-11_2.40.0-2_amd64
libgtop2-common_2.40.0-2_all
libgudev-1.0-0_237-2_amd64
libgumbo1_0.10.1+dfsg-5_amd64
libgupnp-1.6-0_1.6.3-1_amd64
libgupnp-av-1.0-3_0.14.1-1_amd64
libgupnp-dlna-2.0-4_0.12.0-3_amd64
libgupnp-igd-1.0-4_1.2.0-3_amd64
libgusb2_0.3.10-1_amd64
libgweather-4-0_4.2.0-2_amd64
libgweather-4-common_4.2.0-2_all
libgxps2_0.3.2-2+b1_amd64
libhandy-1-0_1.8.1-1_amd64
libharfbuzz-icu0_6.0.0+dfsg-3_amd64
libharfbuzz0b_6.0.0+dfsg-3_amd64
libheif1_1.15.1-1+deb12u1_amd64
libhogweed6_3.8.1-2_amd64
libhtml-form-perl_6.11-1_all
libhtml-format-perl_2.16-2_all
libhtml-html5-entities-perl_0.004-3_all
libhtml-parser-perl_3.81-1_amd64
libhtml-tagset-perl_3.20-6_all
libhtml-template-perl_2.97-2_all
libhtml-tokeparser-simple-perl_3.16-4_all
libhtml-tree-perl_5.07-3_all
libhttp-cookies-perl_6.10-1_all
libhttp-daemon-perl_6.16-1_all
libhttp-date-perl_6.05-2_all
libhttp-message-perl_6.44-1_all
libhttp-negotiate-perl_6.01-2_all
libhttp-tiny-multipart-perl_0.08-2_all
libhunspell-1.7-0_1.7.1-1_amd64
libhwy1_1.0.3-3+deb12u1_amd64
libhyphen0_2.8.8-7_amd64
libibus-1.0-5_1.5.27-5_amd64
libibverbs1_44.0-2_amd64
libical3_3.0.16-1+b1_amd64
libice6_2:1.0.10-1_amd64
libicu72_72.1-3_amd64
libidn12_1.41-1_amd64
libidn2-0_2.3.3-1+b1_amd64
libidn2-dev_2.3.3-1+b1_amd64
libiec61883-0_1.2.0-6+b1_amd64
libieee1284-3_0.2.11-14_amd64
libigdgmm12_22.3.3+ds1-1_amd64
libijs-0.35_0.35-15_amd64
libimage-exiftool-perl_12.57+dfsg-1_all
libimath-3-1-29_3.1.6-1_amd64
libimobiledevice6_1.3.0-6+b3_amd64
libimport-into-perl_1.002005-2_all
libindirect-perl_0.39-2+b1_amd64
libinput-bin_1.22.1-1_amd64
libinput10_1.22.1-1_amd64
libinstpatch-1.0-2_1.1.6-1_amd64
libintl-perl_1.33-1_all
libintl-xs-perl_1.33-1_amd64
libio-html-perl_1.004-3_all
libio-interactive-perl_1.023-2_all
libio-prompter-perl_0.004015-2_all
libio-pty-perl_1:1.17-1_amd64
libio-sessiondata-perl_1.03-3_all
libio-socket-ssl-perl_2.081-2_all
libio-string-perl_1.08-4_all
libio-stringy-perl_2.111-3_all
libip4tc2_1.8.9-2_amd64
libip6tc2_1.8.9-2_amd64
libipc-run-perl_20220807.0-1_all
libipc-run3-perl_0.048-3_all
libipc-system-simple-perl_1.30-2_all
libiptcdata0_1.0.5-2.3_amd64
libisl23_0.25-1.1_amd64
libisofs6_1.5.4-1_amd64
libiterator-perl_0.03+ds1-2_all
libiterator-util-perl_0.02+ds1-2_all
libitm1_12.2.0-14_amd64
libjack-jackd2-0_1.9.21~dfsg-3_amd64
libjansson4_2.14-2_amd64
libjavascriptcoregtk-4.0-18_2.46.5-1~deb12u1_amd64
libjavascriptcoregtk-4.1-0_2.46.5-1~deb12u1_amd64
libjavascriptcoregtk-6.0-1_2.46.5-1~deb12u1_amd64
libjaylink0_0.3.1-1_amd64
libjbig0_2.1-6.1_amd64
libjbig2dec0_0.19-3_amd64
libjcat1_0.1.9-1_amd64
libjcode-pm-perl_2.06-1.1_amd64
libjemalloc2_5.3.0-1_amd64
libjim0.81_0.81+dfsg0-2_amd64
libjpeg62-turbo_1:2.1.5-2_amd64
libjq1_1.6-2.1_amd64
libjs-jquery_3.6.1+dfsg+~3.5.14-1_all
libjs-sphinxdoc_5.3.0-4_all
libjs-underscore_1.13.4~dfsg+~1.11.4-3_all
libjson-c5_0.16-2_amd64
libjson-glib-1.0-0_1.6.6-1_amd64
libjson-glib-1.0-common_1.6.6-1_all
libjson-maybexs-perl_1.004004-1_all
libjson-perl_4.10000-1_all
libjson-xs-perl_4.030-2+b1_amd64
libjte2_1.22-3_amd64
libjxl0.7_0.7.0-10_amd64
libjxr-tools_1.2~git20170615.f752187-5_amd64
libjxr0_1.2~git20170615.f752187-5_amd64
libk5crypto3_1.20.1-2+deb12u2_amd64
libkate1_0.4.1-11_amd64
libkeyutils1_1.6.3-2_amd64
libklibc_2.0.12-1_amd64
libkmod2_30+20221128-1_amd64
libkpathsea6_2022.20220321.62855-5.1+deb12u2_amd64
libkrb5-3_1.20.1-2+deb12u2_amd64
libkrb5support0_1.20.1-2+deb12u2_amd64
libksba8_1.6.3-2_amd64
liblangtag-common_0.6.4-2_all
liblangtag1_0.6.4-2_amd64
liblapack3_3.11.0-2_amd64
liblc3-0_1.0.1-1+b1_amd64
liblcms2-2_2.14-2_amd64
libldacbt-abr2_2.0.2.3+git20200429+ed310a0-4_amd64
libldacbt-enc2_2.0.2.3+git20200429+ed310a0-4_amd64
libldap-2.5-0_2.5.13+dfsg-5_amd64
libldap-common_2.5.13+dfsg-5_all
libldb2_2:2.6.2+samba4.17.12+dfsg-0+deb12u1_amd64
liblerc4_4.0.0+ds-2_amd64
liblilv-0-0_0.24.14-1_amd64
liblirc-client0_0.10.1-7.2_amd64
liblist-compare-perl_0.55-2_all
liblist-someutils-perl_0.59-1_all
liblist-someutils-xs-perl_0.58-3_amd64
liblist-utilsby-perl_0.12-2_all
libllvm15_1:15.0.6-4+b1_amd64
liblmdb0_0.9.24-1_amd64
liblocale-gettext-perl_1.07-5_amd64
liblockfile-bin_1.17-1+b1_amd64
liblog-any-adapter-screen-perl_0.140-2_all
liblog-any-perl_1.713-1_all
liblouis-data_3.24.0-1_all
liblouis20_3.24.0-1_amd64
liblouisutdml-bin_2.11.0-2_amd64
liblouisutdml-data_2.11.0-2_all
liblouisutdml9_2.11.0-2_amd64
liblqr-1-0_0.4.2-2.1_amd64
liblrdf0_0.6.1-4_amd64
liblsan0_12.2.0-14_amd64
libltc11_1.3.2-1_amd64
libltdl-dev_2.4.7-7~deb12u1_amd64
libltdl7_2.4.7-7~deb12u1_amd64
liblua5.3-0_5.3.6-2_amd64
liblwp-mediatypes-perl_6.04-2_all
liblwp-protocol-https-perl_6.10-1_all
liblz1_1.13-5_amd64
liblz4-1_1.9.4-1_amd64
liblzf1_3.6-3_amd64
liblzma5_5.4.1-0.2_amd64
liblzo2-2_2.10-2_amd64
libmagic-mgc_1:5.44-3_amd64
libmagic1_1:5.44-3_amd64
libmagickcore-6.q16-6_8:6.9.11.60+dfsg-1.6+deb12u2_amd64
libmagickcore-6.q16-6-extra_8:6.9.11.60+dfsg-1.6+deb12u2_amd64
libmagickwand-6.q16-6_8:6.9.11.60+dfsg-1.6+deb12u2_amd64
libmail-sendmail-perl_0.80-3_all
libmailtools-perl_2.21-2_all
libmalcontent-0-0_0.11.0-4_amd64
libmalcontent-ui-1-1_0.11.0-4_amd64
libmanette-0.2-0_0.2.6-3+b1_amd64
libmariadb3_1:10.11.6-0+deb12u1_amd64
libmarkdown2_2.2.7-2_amd64
libmath-base85-perl_0.5+dfsg-2_all
libmaxminddb0_1.7.1-1_amd64
libmbedcrypto7_2.28.3-1_amd64
libmbim-glib4_1.28.2-1_amd64
libmbim-proxy_1.28.2-1_amd64
libmbim-utils_1.28.2-1_amd64
libmd0_1.0.4-2_amd64
libmd4c0_0.4.8-1_amd64
libmediaart-2.0-0_1.9.6-1_amd64
libmfx1_22.5.4-1_amd64
libmhash2_0.9.9.9-9_amd64
libmime-charset-perl_1.013.1-2_all
libmime-tools-perl_5.510-1_all
libminiupnpc17_2.2.4-1+b1_amd64
libminizip1_1.1-8+deb12u1_amd64
libmjpegutils-2.1-0_1:2.1.0+debian-7_amd64
libmldbm-perl_2.05-4_all
libmm-glib0_1.20.4-1_amd64
libmnl0_1.0.4-3_amd64
libmodplug1_1:0.8.9.0-3_amd64
libmodule-find-perl_0.16-2_all
libmodule-implementation-perl_0.09-2_all
libmodule-runtime-perl_0.016-2_all
libmoo-perl_2.005005-1_all
libmoox-aliases-perl_0.001006-2_all
libmount1_2.38.1-5+deb12u3_amd64
libmouse-perl_2.5.10-1+b3_amd64
libmozjs-102-0_102.15.1-1~deb12u1_amd64
libmp3lame0_3.100-6_amd64
libmpc3_1.3.1-1_amd64
libmpcdec6_2:0.1~r495-2_amd64
libmpeg2-4_0.5.1-9_amd64
libmpeg2encpp-2.1-0_1:2.1.0+debian-7_amd64
libmpfr6_4.2.0-1_amd64
libmpg123-0_1.31.2-1+deb12u1_amd64
libmplex2-2.1-0_1:2.1.0+debian-7_amd64
libmspub-0.1-1_0.1.4-3+b3_amd64
libmtdev1_1.1.6-1_amd64
libmtp-common_1.1.20-1_all
libmtp-runtime_1.1.20-1_amd64
libmtp9_1.1.20-1_amd64
libmujs2_1.3.2-1_amd64
libmutter-11-0_43.8-0+deb12u1_amd64
libmwaw-0.3-3_0.3.21-1_amd64
libmysofa1_1.3.1~dfsg0-1_amd64
libmythes-1.2-0_2:1.2.5-1_amd64
libnamespace-clean-perl_0.27-2_all
libnatpmp1_20150609-7.1+b2_amd64
libnautilus-extension4_43.2-1_amd64
libncurses6_6.4-4_amd64
libncursesw6_6.4-4_amd64
libndctl6_76.1-1_amd64
libndp0_1.8-1+deb12u1_amd64
libneon27_0.32.5-1_amd64
libnet-dbus-perl_1.2.0-2_amd64
libnet-domain-tld-perl_1.75-3_all
libnet-http-perl_6.22-1_all
libnet-ipv6addr-perl_1.02-1_all
libnet-netmask-perl_2.0002-2_all
libnet-smtp-ssl-perl_1.04-2_all
libnet-ssleay-perl_1.92-2+b1_amd64
libnet1_1.1.6+dfsg-3.2_amd64
libnetaddr-ip-perl_4.079+dfsg-2+b1_amd64
libnetfilter-conntrack3_1.0.9-3_amd64
libnettle8_3.8.1-2_amd64
libnewt0.52_0.52.23-1+b1_amd64
libnfnetlink0_1.0.2-2_amd64
libnfs13_4.0.0-1_amd64
libnfsidmap1_1:2.6.2-4+deb12u1_amd64
libnftables1_1.0.6-2+deb12u2_amd64
libnftnl11_1.2.4-2_amd64
libnghttp2-14_1.52.0-1+deb12u2_amd64
libnice10_0.1.21-1_amd64
libnl-3-200_3.7.0-0.2+b1_amd64
libnl-genl-3-200_3.7.0-0.2+b1_amd64
libnl-route-3-200_3.7.0-0.2+b1_amd64
libnm0_1.42.4-1_amd64
libnma-common_1.10.6-1_all
libnma-gtk4-0_1.10.6-1_amd64
libnma0_1.10.6-1_amd64
libnorm1_1.5.9+dfsg-2_amd64
libnotify4_0.8.1-1_amd64
libnpth0_1.6-3_amd64
libnsl-dev_1.3.0-2_amd64
libnsl2_1.3.0-2_amd64
libnspr4_2:4.35-1_amd64
libnss-mdns_0.15.1-3_amd64
libnss-myhostname_252.33-1~deb12u1_amd64
libnss-systemd_252.33-1~deb12u1_amd64
libnss3_2:3.87.1-1+deb12u1_amd64
libntfs-3g89_1:2022.10.3-1+deb12u2_amd64
libnuma1_2.0.16-1_amd64
libnumber-compare-perl_0.03-3_all
libnumbertext-1.0-0_1.0.11-1_amd64
libnumbertext-data_1.0.11-1_all
liboauth0_1.0.3-5_amd64
libobject-pad-perl_0.78-1_amd64
libodfgen-0.1-1_0.1.8-2_amd64
libogg0_1.3.5-3_amd64
libole-storage-lite-perl_0.20-2_all
libonig5_6.9.8-1_amd64
libopenal-data_1:1.19.1-2_all
libopenal1_1:1.19.1-2_amd64
libopencore-amrnb0_0.1.6-1_amd64
libopencore-amrwb0_0.1.6-1_amd64
libopenexr-3-1-30_3.1.5-5_amd64
libopengl0_1.6.0-1_amd64
libopenh264-7_2.3.1+dfsg-3_amd64
libopenjp2-7_2.5.0-2_amd64
libopenmpt0_0.6.9-1_amd64
libopenni2-0_2.2.0.33+dfsg-15+b1_amd64
libopus0_1.3.1-3_amd64
liborc-0.4-0_1:0.4.33-2_amd64
liborcus-0.17-0_0.17.2-2+b2_amd64
liborcus-parser-0.17-0_0.17.2-2+b2_amd64
libosinfo-1.0-0_1.10.0-2_amd64
libosinfo-l10n_1.10.0-2_all
libostree-1-1_2022.7-2+deb12u1_amd64
libp11-kit-dev_0.24.1-2_amd64
libp11-kit0_0.24.1-2_amd64
libpackage-stash-perl_0.40-1_all
libpackage-stash-xs-perl_0.30-1+b1_amd64
libpackagekit-glib2-18_1.2.6-5_amd64
libpagemaker-0.0-0_0.0.4-1_amd64
libpam-gnome-keyring_42.1-1+b2_amd64
libpam-modules_1.5.2-6+deb12u1_amd64
libpam-modules-bin_1.5.2-6+deb12u1_amd64
libpam-runtime_1.5.2-6+deb12u1_all
libpam-systemd_252.33-1~deb12u1_amd64
libpam0g_1.5.2-6+deb12u1_amd64
libpango-1.0-0_1.50.12+ds-1_amd64
libpangocairo-1.0-0_1.50.12+ds-1_amd64
libpangoft2-1.0-0_1.50.12+ds-1_amd64
libpangomm-1.4-1v5_2.46.3-1_amd64
libpangoxft-1.0-0_1.50.12+ds-1_amd64
libpaper-utils_1.1.29_amd64
libpaper1_1.1.29_amd64
libparams-classify-perl_0.015-2+b1_amd64
libparams-util-perl_1.102-2+b1_amd64
libparse-recdescent-perl_1.967015+dfsg-4_all
libparted-fs-resize0_3.5-3_amd64
libparted2_3.5-3_amd64
libpath-iterator-rule-perl_1.015-2_all
libpath-tiny-perl_0.144-1_all
libpcap0.8_1.10.3-1_amd64
libpcaudio0_1.2-2_amd64
libpci3_1:3.9.0-4_amd64
libpciaccess0_0.17-2_amd64
libpcre16-3_2:8.39-15_amd64
libpcre2-16-0_10.42-1_amd64
libpcre2-8-0_10.42-1_amd64
libpcre3_2:8.39-15_amd64
libpcre3-dev_2:8.39-15_amd64
libpcre32-3_2:8.39-15_amd64
libpcrecpp0v5_2:8.39-15_amd64
libpcsclite1_1.9.9-2_amd64
libpdfbox-java_1:1.8.16-2_all
libpeas-1.0-0_1.34.0-1+b1_amd64
libpeas-common_1.34.0-1_all
libperl4-corelibs-perl_0.004-3_all
libperl5.36_5.36.0-7+deb12u1_amd64
libperlio-gzip-perl_0.20-1+b1_amd64
libperlio-utf8-strict-perl_0.010-1_amd64
libpgm-5.3-0_5.3.128~dfsg-2_amd64
libphonenumber8_8.12.57+ds-3_amd64
libpipeline1_1.5.7-1_amd64
libpipewire-0.3-0_0.3.65-3+deb12u1_amd64
libpipewire-0.3-common_0.3.65-3+deb12u1_all
libpipewire-0.3-modules_0.3.65-3+deb12u1_amd64
libpixman-1-0_0.42.2-1_amd64
libpkcs11-helper1_1.29.0-1_amd64
libpkgconf3_1.8.1-1_amd64
libplacebo208_4.208.0-3_amd64
libplist3_2.2.0-6+b2_amd64
libplymouth5_22.02.122-3_amd64
libpmem1_1.12.1-2_amd64
libpng16-16_1.6.39-2_amd64
libpocketsphinx3_0.8+5prealpha+1-15_amd64
libpod-constants-perl_0.19-2_all
libpod-parser-perl_1.65-1_all
libpolkit-agent-1-0_122-3_amd64
libpolkit-gobject-1-0_122-3_amd64
libpoppler-cpp0v5_22.12.0-2+b1_amd64
libpoppler-glib8_22.12.0-2+b1_amd64
libpoppler126_22.12.0-2+b1_amd64
libpopt0_1.19+dfsg-1_amd64
libportal-gtk3-1_0.6-4_amd64
libportal-gtk4-1_0.6-4_amd64
libportal1_0.6-4_amd64
libpostproc56_7:5.1.6-0+deb12u1_amd64
libpotrace0_1.16-2_amd64
libproc-processtable-perl_0.634-1+b2_amd64
libproc2-0_2:4.0.2-3_amd64
libprotobuf-c1_1.4.1-1+b1_amd64
libprotobuf32_3.21.12-3_amd64
libproxy1-plugin-gsettings_0.4.18-1.2_amd64
libproxy1-plugin-networkmanager_0.4.18-1.2_amd64
libproxy1-plugin-webkit_0.4.18-1.2_amd64
libproxy1v5_0.4.18-1.2_amd64
libpsl5_0.21.2-1_amd64
libpst4_0.6.76-1_amd64
libptexenc1_2022.20220321.62855-5.1+deb12u2_amd64
libpulse-mainloop-glib0_16.1+dfsg1-2+b1_amd64
libpulse0_16.1+dfsg1-2+b1_amd64
libpwquality-common_1.4.5-1_all
libpwquality1_1.4.5-1+b1_amd64
libpython3-dev_3.11.2-1+b1_amd64
libpython3-stdlib_3.11.2-1+b1_amd64
libpython3.11_3.11.2-6+deb12u5_amd64
libpython3.11-dev_3.11.2-6+deb12u5_amd64
libpython3.11-minimal_3.11.2-6+deb12u5_amd64
libpython3.11-stdlib_3.11.2-6+deb12u5_amd64
libqmi-glib5_1.32.2-1_amd64
libqmi-proxy_1.32.2-1_amd64
libqmi-utils_1.32.2-1_amd64
libqpdf29_11.3.0-1+deb12u1_amd64
libqqwing2v5_1.3.4-1.1+b1_amd64
libqrencode4_4.1.1-1_amd64
libqrtr-glib0_1.2.2-1_amd64
libqt5concurrent5_5.15.8+dfsg-11+deb12u2_amd64
libqt5core5a_5.15.8+dfsg-11+deb12u2_amd64
libqt5dbus5_5.15.8+dfsg-11+deb12u2_amd64
libqt5gui5_5.15.8+dfsg-11+deb12u2_amd64
libqt5network5_5.15.8+dfsg-11+deb12u2_amd64
libqt5qml5_5.15.8+dfsg-3_amd64
libqt5qmlmodels5_5.15.8+dfsg-3_amd64
libqt5quick5_5.15.8+dfsg-3_amd64
libqt5svg5_5.15.8-3_amd64
libqt5waylandclient5_5.15.8-2_amd64
libqt5waylandcompositor5_5.15.8-2_amd64
libqt5widgets5_5.15.8+dfsg-11+deb12u2_amd64
libqt5x11extras5_5.15.8-2_amd64
libquadmath0_12.2.0-14_amd64
libqxp-0.0-0_0.0.2-1+b3_amd64
librabbitmq4_0.11.0-1+b1_amd64
librados2_16.2.15+ds-0+deb12u1_amd64
libraptor2-0_2.0.15-4_amd64
librasqal3_0.9.33-2_amd64
librav1e0_0.5.1-6_amd64
libraw1394-11_2.1.2-2_amd64
libraw20_0.20.2-2.1_amd64
librdf0_1.0.17-3_amd64
librdmacm1_44.0-2_amd64
libre-engine-re2-perl_0.17+ds-1_amd64
libre2-9_20220601+dfsg-1+b1_amd64
libreadline8_8.2-1.3_amd64
libreadonly-perl_2.050-3_all
libref-util-perl_0.204-2_all
libref-util-xs-perl_0.117-2+b1_amd64
libregexp-ipv6-perl_0.03-3_all
libregexp-pattern-license-perl_3.9.4-3_all
libregexp-pattern-perl_0.2.14-2_all
libregexp-wildcards-perl_1.05-3_all
libreoffice-base-core_4:7.4.7-1+deb12u5_amd64
libreoffice-calc_4:7.4.7-1+deb12u5_amd64
libreoffice-common_4:7.4.7-1+deb12u5_all
libreoffice-core_4:7.4.7-1+deb12u5_amd64
libreoffice-draw_4:7.4.7-1+deb12u5_amd64
libreoffice-gnome_4:7.4.7-1+deb12u5_amd64
libreoffice-gtk3_4:7.4.7-1+deb12u5_amd64
libreoffice-help-common_4:7.4.7-1+deb12u5_all
libreoffice-help-en-us_4:7.4.7-1+deb12u5_all
libreoffice-impress_4:7.4.7-1+deb12u5_amd64
libreoffice-math_4:7.4.7-1+deb12u5_amd64
libreoffice-style-colibre_4:7.4.7-1+deb12u5_all
libreoffice-style-elementary_4:7.4.7-1+deb12u5_all
libreoffice-writer_4:7.4.7-1+deb12u5_amd64
librest-1.0-0_0.9.1-6_amd64
librevenge-0.0-0_0.0.5-3_amd64
librhythmbox-core10_3.4.6-2+b1_amd64
librist4_0.2.7+dfsg-1_amd64
librole-tiny-perl_2.002004-1_all
librsvg2-2_2.54.7+dfsg-1~deb12u1_amd64
librsvg2-common_2.54.7+dfsg-1~deb12u1_amd64
librtmp1_2.4+20151223.gitfa8646d.1-2+b2_amd64
librubberband2_3.1.2+dfsg0-1_amd64
libruby_1:3.1_amd64
libruby3.1_3.1.2-7+deb12u1_amd64
librygel-core-2.8-0_0.42.1-1_amd64
librygel-db-2.8-0_0.42.1-1_amd64
librygel-renderer-2.8-0_0.42.1-1_amd64
librygel-renderer-gst-2.8-0_0.42.1-1_amd64
librygel-server-2.8-0_0.42.1-1_amd64
libsamplerate0_0.2.2-3_amd64
libsane-common_1.2.1-2_all
libsane1_1.2.1-2_amd64
libsasl2-2_2.1.28+dfsg-10_amd64
libsasl2-modules_2.1.28+dfsg-10_amd64
libsasl2-modules-db_2.1.28+dfsg-10_amd64
libsbc1_2.0-1_amd64
libsdl2-2.0-0_2.26.5+dfsg-1_amd64
libseccomp2_2.5.4-1+deb12u1_amd64
libsecret-1-0_0.20.5-3_amd64
libsecret-common_0.20.5-3_all
libselinux1_3.4-1+b6_amd64
libsemanage-common_3.4-1_all
libsemanage2_3.4-1+b5_amd64
libsensors-config_1:3.6.0-7.1_all
libsensors5_1:3.6.0-7.1_amd64
libsepol2_3.4-2.1_amd64
libserd-0-0_0.30.16-1_amd64
libsereal-decoder-perl_5.003+ds-1_amd64
libsereal-encoder-perl_5.003+ds-1_amd64
libset-intspan-perl_1.19-3_all
libsgutils2-1.46-2_1.46-3_amd64
libshine3_3.1.1-2_amd64
libshout3_2.4.6-1+b1_amd64
libshumate-1.0-1_1.0.3-2_amd64
libshumate-common_1.0.3-2_all
libsidplay1v5_1.36.60-1_amd64
libsigc++-2.0-0v5_2.12.0-1_amd64
libsigsegv2_2.14-1_amd64
libslang2_2.3.3-3_amd64
libslirp0_4.7.0-1_amd64
libsm6_2:1.2.3-1_amd64
libsmartcols1_2.38.1-5+deb12u3_amd64
libsmbclient_2:4.17.12+dfsg-0+deb12u1_amd64
libsmbios-c2_2.4.3-1_amd64
libsnapd-glib-2-1_1.63-5_amd64
libsnappy1v5_1.1.9-3_amd64
libsndfile1_1.2.0-1_amd64
libsndio7.0_1.9.0-0.3+b2_amd64
libsnmp-base_5.9.3+dfsg-2_all
libsnmp40_5.9.3+dfsg-2_amd64
libsoap-lite-perl_1.27-3_all
libsocket6-perl_0.29-3_amd64
libsodium23_1.0.18-1_amd64
libsombok3_2.4.0-2+b1_amd64
libsonic0_0.2.0-12_amd64
libsord-0-0_0.16.14+git221008-1_amd64
libsort-naturally-perl_1.03-4_all
libsort-versions-perl_1.62-3_all
libsoundtouch1_2.3.2+ds1-1_amd64
libsoup-3.0-0_3.2.2-2_amd64
libsoup-3.0-common_3.2.2-2_all
libsoup-gnome2.4-1_2.74.3-1+deb12u1_amd64
libsoup2.4-1_2.74.3-1+deb12u1_amd64
libsoup2.4-common_2.74.3-1+deb12u1_all
libsoxr0_0.1.3-4_amd64
libspa-0.2-bluetooth_0.3.65-3+deb12u1_amd64
libspa-0.2-modules_0.3.65-3+deb12u1_amd64
libspandsp2_0.0.6+dfsg-2+b1_amd64
libspectre1_0.2.12-1_amd64
libspeechd2_0.11.4-2_amd64
libspeex1_1.2.1-2_amd64
libsphinxbase3_0.8+5prealpha+1-16_amd64
libspreadsheet-parseexcel-perl_0.6500-4~deb12u1_all
libspreadsheet-writeexcel-perl_2.40-4_all
libsqlite3-0_3.40.1-2+deb12u1_amd64
libsratom-0-0_0.6.14-1_amd64
libsrt1.5-gnutls_1.5.1-1+deb12u1_amd64
libsrtp2-1_2.5.0-3_amd64
libss2_1.47.0-2_amd64
libssh-gcrypt-4_0.10.6-0+deb12u1_amd64
libssh2-1_1.10.0-3+b1_amd64
libssl-dev_3.0.15-1~deb12u1_amd64
libssl3_3.0.15-1~deb12u1_amd64
libstaroffice-0.0-0_0.0.7-1_amd64
libstartup-notification0_0.12-6+b1_amd64
libstdc++-12-dev_12.2.0-14_amd64
libstdc++6_12.2.0-14_amd64
libstemmer0d_2.2.0-2_amd64
libstrictures-perl_2.000006-1_all
libstring-copyright-perl_0.003014-1_all
libstring-escape-perl_2010.002-3_all
libstring-license-perl_0.0.2-1_all
libstring-shellquote-perl_1.04-3_all
libsub-exporter-perl_0.989-1_all
libsub-exporter-progressive-perl_0.001013-3_all
libsub-identify-perl_0.14-3_amd64
libsub-install-perl_0.929-1_all
libsub-name-perl_0.26-2+b1_amd64
libsub-override-perl_0.09-4_all
libsub-quote-perl_2.006008-1_all
libsuitesparseconfig5_1:5.12.0+dfsg-2_amd64
libsvtav1enc1_1.4.1+dfsg-1_amd64
libswresample4_7:5.1.6-0+deb12u1_amd64
libswscale6_7:5.1.6-0+deb12u1_amd64
libsynctex2_2022.20220321.62855-5.1+deb12u2_amd64
libsyntax-keyword-try-perl_0.28-1_amd64
libsys-cpuaffinity-perl_1.13~03-2+b1_amd64
libsys-hostname-long-perl_1.5-3_all
libsystemd-shared_252.33-1~deb12u1_amd64
libsystemd0_252.33-1~deb12u1_amd64
libtag1v5_1.13-2_amd64
libtag1v5-vanilla_1.13-2_amd64
libtalloc2_2.4.0-f2_amd64
libtask-weaken-perl_1.06-2_all
libtasn1-6_4.19.0-2+deb12u1_amd64
libtasn1-6-dev_4.19.0-2+deb12u1_amd64
libtasn1-doc_4.19.0-2+deb12u1_all
libtcl8.6_8.6.13+dfsg-2_amd64
libtdb1_1.4.8-2_amd64
libteamdctl0_1.31-1_amd64
libteckit0_2.5.11+ds1-1+b1_amd64
libterm-readkey-perl_2.38-2+b1_amd64
libtevent0_0.14.1-1_amd64
libtexlua53-5_2022.20220321.62855-5.1+deb12u2_amd64
libtexluajit2_2022.20220321.62855-5.1+deb12u2_amd64
libtext-charwidth-perl_0.04-11_amd64
libtext-glob-perl_0.11-3_all
libtext-iconv-perl_1.7-8_amd64
libtext-levenshteinxs-perl_0.03-5+b1_amd64
libtext-markdown-discount-perl_0.16-1_amd64
libtext-wrapi18n-perl_0.06-10_all
libtext-xslate-perl_3.5.9-1+b2_amd64
libthai-data_0.1.29-1_all
libthai0_0.1.29-1_amd64
libtheora0_1.1.1+dfsg.1-16.1+b1_amd64
libtie-ixhash-perl_1.23-4_all
libtiff6_4.5.0-6+deb12u2_amd64
libtime-duration-perl_1.21-2_all
libtime-moment-perl_0.44-2+b1_amd64
libtimedate-perl_2.3300-2_all
libtinfo6_6.4-4_amd64
libtirpc-common_1.3.3+ds-1_all
libtirpc-dev_1.3.3+ds-1_amd64
libtirpc3_1.3.3+ds-1_amd64
libtk8.6_8.6.13-2_amd64
libtool_2.4.7-7~deb12u1_all
libtotem-plparser-common_3.26.6-1_all
libtotem-plparser18_3.26.6-1+b1_amd64
libtotem0_43.0-2_amd64
libtracker-sparql-3.0-0_3.4.2-1_amd64
libtry-tiny-perl_0.31-2_all
libtsan2_12.2.0-14_amd64
libtspi1_0.3.15-0.3_amd64
libtss2-esys-3.0.2-0_3.2.1-3_amd64
libtss2-mu0_3.2.1-3_amd64
libtss2-rc0_3.2.1-3_amd64
libtss2-sys1_3.2.1-3_amd64
libtss2-tcti-cmd0_3.2.1-3_amd64
libtss2-tcti-device0_3.2.1-3_amd64
libtss2-tcti-mssim0_3.2.1-3_amd64
libtss2-tcti-swtpm0_3.2.1-3_amd64
libtss2-tctildr0_3.2.1-3_amd64
libtwolame0_0.4.0-2_amd64
libtype-tiny-perl_2.002001-1_all
libtype-tiny-xs-perl_0.025-1_amd64
libtypes-serialiser-perl_1.01-1_all
libubsan1_12.2.0-14_amd64
libuchardet0_0.0.7-1_amd64
libudev1_252.33-1~deb12u1_amd64
libudfread0_1.1.2-1_amd64
libudisks2-0_2.9.4-4_amd64
libunbound8_1.17.1-2+deb12u2_amd64
libunicode-linebreak-perl_0.0.20190101-1+b5_amd64
libunicode-map-perl_0.112-13+b1_amd64
libunicode-utf8-perl_0.62-2_amd64
libunistring2_1.0-2_amd64
libunity-protocol-private0_7.1.4+19.04.20190319-6+b1_amd64
libunity-scopes-json-def-desktop_7.1.4+19.04.20190319-6_all
libunity9_7.1.4+19.04.20190319-6+b1_amd64
libuno-cppu3_4:7.4.7-1+deb12u5_amd64
libuno-cppuhelpergcc3-3_4:7.4.7-1+deb12u5_amd64
libuno-purpenvhelpergcc3-3_4:7.4.7-1+deb12u5_amd64
libuno-sal3_4:7.4.7-1+deb12u5_amd64
libuno-salhelpergcc3-3_4:7.4.7-1+deb12u5_amd64
libunwind8_1.6.2-3_amd64
libupower-glib3_0.99.20-2_amd64
liburi-perl_5.17-1_all
liburing2_2.3-3_amd64
libusb-1.0-0_2:1.0.26-1_amd64
libusbmuxd6_2.0.2-3_amd64
libutempter0_1.2.1-3_amd64
libuuid1_2.38.1-5+deb12u3_amd64
libuv1_1.44.2-1+deb12u1_amd64
libv4l-0_1.22.1-5+b2_amd64
libv4lconvert0_1.22.1-5+b2_amd64
libva-drm2_2.17.0-1_amd64
libva-x11-2_2.17.0-1_amd64
libva2_2.17.0-1_amd64
libvariable-magic-perl_0.63-1+b1_amd64
libvdpau-va-gl1_0.4.2-1+b1_amd64
libvdpau1_1.5-2_amd64
libvidstab1.1_1.1.0-2+b1_amd64
libvisio-0.1-1_0.1.7-1+b3_amd64
libvisual-0.4-0_0.4.0-19_amd64
libvo-aacenc0_0.1.3-2_amd64
libvo-amrwbenc0_0.1.3-2_amd64
libvolume-key1_0.3.12-5+b1_amd64
libvorbis0a_1.3.7-1_amd64
libvorbisenc2_1.3.7-1_amd64
libvorbisfile3_1.3.7-1_amd64
libvpx7_1.12.0-1+deb12u3_amd64
libvte-2.91-0_0.70.6-2~deb12u1_amd64
libvte-2.91-common_0.70.6-2~deb12u1_amd64
libvulkan1_1.3.239.0-1_amd64
libwacom-common_2.6.0-1_all
libwacom9_2.6.0-1_amd64
libwant-perl_0.29-2+b1_amd64
libwavpack1_5.6.0-1_amd64
libwayland-client0_1.21.0-1_amd64
libwayland-cursor0_1.21.0-1_amd64
libwayland-egl1_1.21.0-1_amd64
libwayland-server0_1.21.0-1_amd64
libwbclient0_2:4.17.12+dfsg-0+deb12u1_amd64
libwebkit2gtk-4.0-37_2.46.5-1~deb12u1_amd64
libwebkit2gtk-4.1-0_2.46.5-1~deb12u1_amd64
libwebkitgtk-6.0-4_2.46.5-1~deb12u1_amd64
libwebp7_1.2.4-0.2+deb12u1_amd64
libwebpdemux2_1.2.4-0.2+deb12u1_amd64
libwebpmux3_1.2.4-0.2+deb12u1_amd64
libwebrtc-audio-processing1_0.3-1+b1_amd64
libwildmidi2_0.4.3-1_amd64
libwinpr2-2_2.10.0+dfsg1-1_amd64
libwireplumber-0.4-0_0.4.13-1_amd64
libwmflite-0.2-7_0.2.12-5.1_amd64
libwnck-3-0_43.0-3_amd64
libwnck-3-common_43.0-3_all
libwoff1_1.0.2-2_amd64
libwpd-0.10-10_0.10.3-2+b1_amd64
libwpg-0.3-3_0.3.3-1_amd64
libwps-0.4-4_0.4.13-1_amd64
libwrap0_7.6.q-32_amd64
libwww-mechanize-perl_2.16-1_all
libwww-perl_6.68-1_all
libwww-robotrules-perl_6.02-1_all
libx11-6_2:1.8.4-2+deb12u2_amd64
libx11-data_2:1.8.4-2+deb12u2_all
libx11-protocol-perl_0.56-9_all
libx11-xcb1_2:1.8.4-2+deb12u2_amd64
libx264-164_2:0.164.3095+gitbaee400-3_amd64
libx265-199_3.5-2+b1_amd64
libxapian30_1.4.22-1_amd64
libxatracker2_22.3.6-1+deb12u1_amd64
libxau6_1:1.0.9-1_amd64
libxaw7_2:1.0.14-1_amd64
libxcb-damage0_1.15-1_amd64
libxcb-dri2-0_1.15-1_amd64
libxcb-dri3-0_1.15-1_amd64
libxcb-glx0_1.15-1_amd64
libxcb-icccm4_0.4.1-1.1_amd64
libxcb-image0_0.4.0-2_amd64
libxcb-keysyms1_0.4.0-1+b2_amd64
libxcb-present0_1.15-1_amd64
libxcb-randr0_1.15-1_amd64
libxcb-render-util0_0.3.9-1+b1_amd64
libxcb-render0_1.15-1_amd64
libxcb-res0_1.15-1_amd64
libxcb-shape0_1.15-1_amd64
libxcb-shm0_1.15-1_amd64
libxcb-sync1_1.15-1_amd64
libxcb-util1_0.4.0-1+b1_amd64
libxcb-xfixes0_1.15-1_amd64
libxcb-xinerama0_1.15-1_amd64
libxcb-xinput0_1.15-1_amd64
libxcb-xkb1_1.15-1_amd64
libxcb-xv0_1.15-1_amd64
libxcb1_1.15-1_amd64
libxcomposite1_1:0.4.5-1_amd64
libxcursor1_1:1.2.1-1_amd64
libxcvt0_0.1.2-1_amd64
libxdamage1_1:1.1.6-1_amd64
libxdelta2_1.1.3-10.4_amd64
libxdmcp6_1:1.1.2-3_amd64
libxext6_2:1.3.4-1+b1_amd64
libxfixes3_1:6.0.0-2_amd64
libxfont2_1:2.0.6-1_amd64
libxft2_2.3.6-1_amd64
libxi6_2:1.8-1+b1_amd64
libxinerama1_2:1.1.4-3_amd64
libxkbcommon-x11-0_1.5.0-1_amd64
libxkbcommon0_1.5.0-1_amd64
libxkbfile1_1:1.1.0-1_amd64
libxkbregistry0_1.5.0-1_amd64
libxklavier16_5.4-4_amd64
libxml-libxml-perl_2.0207+dfsg+really+2.0134-1+b1_amd64
libxml-namespacesupport-perl_1.12-2_all
libxml-parser-perl_2.46-4_amd64
libxml-sax-base-perl_1.09-3_all
libxml-sax-expat-perl_0.51-2_all
libxml-sax-perl_1.02+dfsg-3_all
libxml-twig-perl_1:3.52-2_all
libxml-xpathengine-perl_0.14-2_all
libxml2_2.9.14+dfsg-1.3~deb12u1_amd64
libxmlb2_0.3.10-2_amd64
libxmlrpc-lite-perl_0.717-5_all
libxmlsec1_1.2.37-2_amd64
libxmlsec1-nss_1.2.37-2_amd64
libxmu6_2:1.1.3-3_amd64
libxmuu1_2:1.1.3-3_amd64
libxpm4_1:3.5.12-1.1+deb12u1_amd64
libxrandr2_2:1.5.2-2+b1_amd64
libxrender1_1:0.9.10-1.1_amd64
libxres1_2:1.2.1-1_amd64
libxs-parse-keyword-perl_0.33-1_amd64
libxs-parse-sublike-perl_0.16-1+b2_amd64
libxshmfence1_1.3-1_amd64
libxslt1.1_1.1.35-1_amd64
libxss1_1:1.2.3-1_amd64
libxstring-perl_0.005-2+b1_amd64
libxt6_1:1.2.1-1.1_amd64
libxtables12_1.8.9-2_amd64
libxtst6_2:1.2.3-1.1_amd64
libxv1_2:1.0.11-1.1_amd64
libxvidcore4_2:1.3.7-1_amd64
libxvmc1_2:1.0.12-2_amd64
libxxf86dga1_2:1.1.5-1_amd64
libxxf86vm1_1:1.1.4-1+b2_amd64
libxxhash0_0.8.1-1_amd64
libyajl2_2.1.0-3+deb12u2_amd64
libyaml-0-2_0.2.5-1_amd64
libyaml-libyaml-perl_0.86+ds-1_amd64
libyelp0_42.2-1_amd64
libytnef0_2.0-1+b1_amd64
libyuv0_0.0~git20230123.b2528b0-1_amd64
libz3-4_4.8.12-3.1_amd64
libzbar0_0.23.92-7+deb12u1_amd64
libzimg2_3.0.4+ds1-1_amd64
libzmf-0.0-0_0.0.2-1+b5_amd64
libzmq5_4.3.4-6_amd64
libzstd1_1.5.4+dfsg2-5_amd64
libzvbi-common_0.2.41-1_all
libzvbi0_0.2.41-1_amd64
libzxcvbn0_2.5+dfsg-1_amd64
libzxing2_1.4.0-3+b1_amd64
libzzip-0-13_0.13.72+dfsg.1-1.1_amd64
licensecheck_3.3.5-1_all
lightsoff_1:40.0.1-1_amd64
lintian_2.116.3_all
linux-base_4.9_all
linux-image-6.1.0-29-amd64_6.1.123-1_amd64
linux-image-amd64_6.1.123-1_amd64
linux-libc-dev_6.1.124-1_amd64
lmodern_2.005-1_all
locales_2.36-9+deb12u9_all
login_1:4.13+dfsg1-1+b1_amd64
logrotate_3.21.0-1_amd64
logsave_1.47.0-2_amd64
low-memory-monitor_2.1-1_amd64
lp-solve_5.5.2.5-2_amd64
lsb-release_12.0-1_all
lsof_4.95.0-1_amd64
lynx_2.9.0dev.12-1_amd64
lynx-common_2.9.0dev.12-1_all
lzop_1.04-2_amd64
m4_1.4.19-3_amd64
mailcap_3.70+nmu1_all
make_4.3-4.1_amd64
malcontent_0.11.0-4_all
malcontent-gui_0.11.0-4_amd64
man-db_2.11.2-2_amd64
manpages_6.03-2_all
manpages-dev_6.03-2_all
mariadb-client_1:10.11.6-0+deb12u1_amd64
mariadb-client-core_1:10.11.6-0+deb12u1_amd64
mariadb-common_1:10.11.6-0+deb12u1_all
mariadb-plugin-provider-bzip2_1:10.11.6-0+deb12u1_amd64
mariadb-plugin-provider-lz4_1:10.11.6-0+deb12u1_amd64
mariadb-plugin-provider-lzma_1:10.11.6-0+deb12u1_amd64
mariadb-plugin-provider-lzo_1:10.11.6-0+deb12u1_amd64
mariadb-plugin-provider-snappy_1:10.11.6-0+deb12u1_amd64
mariadb-server_1:10.11.6-0+deb12u1_amd64
mariadb-server-core_1:10.11.6-0+deb12u1_amd64
mawk_1.3.4.20200120-3.1_amd64
media-player-info_24-2_all
media-types_10.0.0_all
mesa-va-drivers_22.3.6-1+deb12u1_amd64
mesa-vdpau-drivers_22.3.6-1+deb12u1_amd64
mesa-vulkan-drivers_22.3.6-1+deb12u1_amd64
mime-support_3.66_all
mobile-broadband-provider-info_20230416-1_all
modemmanager_1.20.4-1_amd64
mokutil_0.6.0-2_amd64
mount_2.38.1-5+deb12u3_amd64
mupdf-tools_1.21.1+ds2-1+b4_amd64
mutter-common_43.8-0+deb12u1_all
mysql-common_5.8+1.1.0_all
mythes-en-us_1:7.5.0-1_all
nano_7.2-1+deb12u1_amd64
nautilus_43.2-1_amd64
nautilus-data_43.2-1_all
nautilus-extension-gnome-terminal_3.46.8-1_amd64
ncurses-base_6.4-4_all
ncurses-bin_6.4-4_amd64
ncurses-term_6.4-4_all
needrestart_3.6-4+deb12u3_all
net-tools_2.10-0.1_amd64
netbase_6.4_all
netcat-traditional_1.10-47_amd64
netfilter-persistent_1.0.20_all
nettle-dev_3.8.1-2_amd64
network-manager_1.42.4-1_amd64
network-manager-gnome_1.30.0-2_amd64
nfs-common_1:2.6.2-4+deb12u1_amd64
nfs-kernel-server_1:2.6.2-4+deb12u1_amd64
nftables_1.0.6-2+deb12u2_amd64
node-clipboard_2.0.11+ds+~cs9.6.11-1_all
node-normalize.css_8.0.1-5_all
node-prismjs_1.29.0+dfsg+~1.26.0-1_all
ntfs-3g_1:2022.10.3-1+deb12u2_amd64
ocl-icd-libopencl1_2.3.1-1_amd64
openjdk-17-jre_17.0.13+11-2~deb12u1_amd64
openjdk-17-jre-headless_17.0.13+11-2~deb12u1_amd64
opensc_0.23.0-0.3+deb12u2_amd64
opensc-pkcs11_0.23.0-0.3+deb12u2_amd64
openssh-client_1:9.2p1-2+deb12u4_amd64
openssh-server_1:9.2p1-2+deb12u4_amd64
openssh-sftp-server_1:9.2p1-2+deb12u4_amd64
openssl_3.0.15-1~deb12u1_amd64
openvpn_2.6.3-1+deb12u2_amd64
orca_43.1-1_all
os-prober_1.81_amd64
osinfo-db_0.20221130-2_all
p11-kit_0.24.1-2_amd64
p11-kit-modules_0.24.1-2_amd64
p7zip_16.02+dfsg-8_amd64
p7zip-full_16.02+dfsg-8_amd64
packagekit_1.2.6-5_amd64
packagekit-tools_1.2.6-5_amd64
pandoc_2.17.1.1-2~deb12u1_amd64
pandoc-data_2.17.1.1-2~deb12u1_all
parted_3.5-3_amd64
passwd_1:4.13+dfsg1-1+b1_amd64
patch_2.7.6-7_amd64
patchutils_0.4.2-1_amd64
pbzip2_1.1.13-1_amd64
pci.ids_0.0~2023.04.11-1_all
pciutils_1:3.9.0-4_amd64
pcscd_1.9.9-2_amd64
perl_5.36.0-7+deb12u1_amd64
perl-base_5.36.0-7+deb12u1_amd64
perl-modules-5.36_5.36.0-7+deb12u1_all
perl-openssl-defaults_7+b1_amd64
perl-tk_1:804.036-1+b2_amd64
php_2:8.2+93_all
php-common_2:93_all
php-mysql_2:8.2+93_all
php8.2_8.2.26-1~deb12u1_all
php8.2-cli_8.2.26-1~deb12u1_amd64
php8.2-common_8.2.26-1~deb12u1_amd64
php8.2-mysql_8.2.26-1~deb12u1_amd64
php8.2-opcache_8.2.26-1~deb12u1_amd64
php8.2-readline_8.2.26-1~deb12u1_amd64
pigz_2.6-1_amd64
pinentry-gnome3_1.2.1-1_amd64
pipewire_0.3.65-3+deb12u1_amd64
pipewire-alsa_0.3.65-3+deb12u1_amd64
pipewire-audio_0.3.65-3+deb12u1_all
pipewire-bin_0.3.65-3+deb12u1_amd64
pipewire-pulse_0.3.65-3+deb12u1_amd64
pixz_1.0.7-2_amd64
pkexec_122-3_amd64
pkg-config_1.8.1-1_amd64
pkgconf_1.8.1-1_amd64
pkgconf-bin_1.8.1-1_amd64
plymouth_22.02.122-3_amd64
plymouth-label_22.02.122-3_amd64
plzip_1.10-5_amd64
po-debconf_1.0.21+nmu1_all
pocketsphinx-en-us_0.8+5prealpha+1-15_all
polkitd_122-3_amd64
poppler-data_0.4.12-1_all
poppler-utils_22.12.0-2+b1_amd64
postfix_3.7.11-0+deb12u1_amd64
power-profiles-daemon_0.12-1+b1_amd64
ppp_2.4.9-1+1.1+b1_amd64
preview-latex-style_12.2-1_all
pristine-tar_1.50_amd64
procps_2:4.0.2-3_amd64
psmisc_23.6-1_amd64
publicsuffix_20230209.2326-1_all
pv_1.6.20-1_amd64
python-apt-common_2.6.0_all
python-babel-localedata_2.10.3-1_all
python3_3.11.2-1+b1_amd64
python3-anyio_3.6.2-1_all
python3-apt_2.6.0_amd64
python3-asgiref_3.6.0-1_all
python3-babel_2.10.3-1_all
python3-blinker_1.5-1_all
python3-brlapi_6.5-7+deb12u1_amd64
python3-cairo_1.20.1-5+b1_amd64
python3-certifi_2022.9.24-1_all
python3-cffi-backend_1.15.1-5+b1_amd64
python3-chardet_5.1.0+dfsg-2_all
python3-charset-normalizer_3.0.1-2_all
python3-click_8.1.3-2_all
python3-colorama_0.4.6-2_all
python3-cryptography_38.0.4-3+deb12u1_amd64
python3-cups_2.0.1-5+b4_amd64
python3-cupshelpers_1.5.18-1_all
python3-dateutil_2.8.2-2_all
python3-dbus_1.3.2-4+b1_amd64
python3-debconf_1.5.82_all
python3-debian_0.1.49_all
python3-debianbts_4.0.1_all
python3-dev_3.11.2-1+b1_amd64
python3-distro_1.8.0-1_all
python3-distro-info_1.5+deb12u1_all
python3-distutils_3.11.2-3_all
python3-dnspython_2.3.0-1_all
python3-dotenv_0.21.0-1_all
python3-flask_2.2.2-3_all
python3-gi_3.42.2-3+b1_amd64
python3-gi-cairo_3.42.2-3+b1_amd64
python3-gpg_1.18.0-3+b1_amd64
python3-h11_0.14.0-1_all
python3-h2_4.1.0-4_all
python3-hpack_4.0.0-2_all
python3-httpcore_0.16.3-1_all
python3-httplib2_0.20.4-3_all
python3-httpx_0.23.3-1_all
python3-hyperframe_6.0.0-1_all
python3-ibus-1.0_1.5.27-5_all
python3-idna_3.3-1+deb12u1_all
python3-itsdangerous_2.1.2-3_all
python3-jinja2_3.1.2-1+deb12u1_all
python3-jwt_2.6.0-1_all
python3-lazr.restfulclient_0.14.5-1_all
python3-lazr.uri_1.0.6-3_all
python3-ldb_2:2.6.2+samba4.17.12+dfsg-0+deb12u1_amd64
python3-lib2to3_3.11.2-3_all
python3-louis_3.24.0-1_all
python3-magic_2:0.4.26-3_all
python3-mako_1.2.4+ds-1_all
python3-markdown_3.4.1-2_all
python3-markdown-it_2.1.0-5_all
python3-markupsafe_2.1.2-1+b1_amd64
python3-mdurl_0.1.2-1_all
python3-minimal_3.11.2-1+b1_amd64
python3-oauthlib_3.2.2-1_all
python3-openssl_23.0.0-1_all
python3-pip_23.0.1+dfsg-1_all
python3-pip-whl_23.0.1+dfsg-1_all
python3-pkg-resources_66.1.1-1+deb12u1_all
python3-protobuf_3.21.12-3_amd64
python3-pyatspi_2.46.0-2_all
python3-pycurl_7.45.2-3_amd64
python3-pygments_2.14.0+dfsg-1_all
python3-pyinotify_0.9.6-2_all
python3-pymysql_1.0.2-2+deb12u1_all
python3-pyparsing_3.0.9-1_all
python3-pysimplesoap_1.16.2-5_all
python3-reportbug_12.0.0_all
python3-requests_2.28.1+dfsg-1_all
python3-requests-toolbelt_0.10.1-1_all
python3-rfc3986_1.5.0-2_all
python3-rich_13.3.1-1_all
python3-samba_2:4.17.12+dfsg-0+deb12u1_amd64
python3-setuptools_66.1.1-1+deb12u1_all
python3-setuptools-whl_66.1.1-1+deb12u1_all
python3-simplejson_3.18.3-1_amd64
python3-six_1.16.0-4_all
python3-smbc_1.0.23-2+b4_amd64
python3-sniffio_1.2.0-1_all
python3-software-properties_0.99.30-4.1~deb12u1_all
python3-speechd_0.11.4-2_all
python3-talloc_2.4.0-f2_amd64
python3-tdb_1.4.8-2_amd64
python3-tz_2022.7.1-4_all
python3-unidiff_0.7.3-1_all
python3-uno_4:7.4.7-1+deb12u5_amd64
python3-urllib3_1.26.12-1+deb12u1_all
python3-wadllib_1.3.6-4_all
python3-werkzeug_2.2.2-3+deb12u1_all
python3-wheel_0.38.4-2_all
python3-xdg_0.28-2_all
python3-yaml_6.0-3+b2_amd64
python3.11_3.11.2-6+deb12u5_amd64
python3.11-dev_3.11.2-6+deb12u5_amd64
python3.11-minimal_3.11.2-6+deb12u5_amd64
python3.11-venv_3.11.2-6+deb12u5_amd64
qemu-guest-agent_1:7.2+dfsg-7+deb12u12_amd64
qt5-gtk-platformtheme_5.15.8+dfsg-11+deb12u2_amd64
qttranslations5-l10n_5.15.8-2_all
qtwayland5_5.15.8-2_amd64
quadrapassel_1:40.2-1_amd64
rake_13.0.6-3_all
readline-common_8.2-1.3_all
realmd_0.17.1-1_amd64
redis-server_5:7.0.15-1~deb12u2_amd64
redis-tools_5:7.0.15-1~deb12u2_amd64
reportbug_12.0.0_all
rhythmbox_3.4.6-2+b1_amd64
rhythmbox-data_3.4.6-2_all
rhythmbox-plugin-cdrecorder_3.4.6-2+b1_amd64
rhythmbox-plugins_3.4.6-2+b1_amd64
rpcbind_1.2.6-6+b1_amd64
rpcsvc-proto_1.4.3-1_amd64
rsync_3.2.7-1+deb12u2_amd64
rtkit_0.13-5_amd64
ruby_1:3.1_amd64
ruby-net-telnet_0.2.0-1_all
ruby-rubygems_3.3.15-2_all
ruby-sdbm_1.0.0-5+b1_amd64
ruby-webrick_1.8.1-1_all
ruby-xmlrpc_0.3.2-2_all
ruby3.1_3.1.2-7+deb12u1_amd64
rubygems-integration_1.18_all
runit-helper_2.15.2_all
rygel_0.42.1-1_amd64
rygel-playbin_0.42.1-1_amd64
rygel-tracker_0.42.1-1_amd64
samba_2:4.17.12+dfsg-0+deb12u1_amd64
samba-ad-provision_2:4.17.12+dfsg-0+deb12u1_all
samba-common_2:4.17.12+dfsg-0+deb12u1_all
samba-common-bin_2:4.17.12+dfsg-0+deb12u1_amd64
samba-dsdb-modules_2:4.17.12+dfsg-0+deb12u1_amd64
samba-libs_2:4.17.12+dfsg-0+deb12u1_amd64
samba-vfs-modules_2:4.17.12+dfsg-0+deb12u1_amd64
sane-airscan_0.99.27-1+b1_amd64
sane-utils_1.2.1-2_amd64
seahorse_43.0-1_amd64
sed_4.9-1_amd64
sensible-utils_0.0.17+nmu1_all
sgml-base_1.31_all
sgml-data_2.0.11+nmu1_all
shared-mime-info_2.2-1_amd64
shim-helpers-amd64-signed_1+15.8+1~deb12u1_amd64
shim-signed_1.44~1+deb12u1+15.8-1~deb12u1_amd64
shim-signed-common_1.44~1+deb12u1+15.8-1~deb12u1_all
shim-unsigned_15.8-1~deb12u1_amd64
shotwell_0.30.17-1+b1_amd64
shotwell-common_0.30.17-1_all
simple-scan_42.5-2_amd64
slirp4netns_1.2.0-1_amd64
smbclient_2:4.17.12+dfsg-0+deb12u1_amd64
smistrip_0.4.8+dfsg2-16_all
snmp_5.9.3+dfsg-2_amd64
snmp-mibs-downloader_1.5_all
snmpd_5.9.3+dfsg-2_amd64
socat_1.7.4.4-2_amd64
software-properties-common_0.99.30-4.1~deb12u1_all
software-properties-gtk_0.99.30-4.1~deb12u1_all
sound-icons_0.1-8_all
sound-theme-freedesktop_0.8-2_all
speech-dispatcher_0.11.4-2_amd64
speech-dispatcher-audio-plugins_0.11.4-2_amd64
speech-dispatcher-espeak-ng_0.11.4-2_amd64
ssl-cert_1.1.2_all
strace_6.1-0.1_amd64
sudo_1.9.13p3-1+deb12u1_amd64
swell-foop_1:41.1-1_amd64
switcheroo-control_2.6-1+b1_amd64
synaptic_0.91.3_amd64
system-config-printer-common_1.5.18-1_all
system-config-printer-udev_1.5.18-1_amd64
systemd_252.33-1~deb12u1_amd64
systemd-sysv_252.33-1~deb12u1_amd64
systemd-timesyncd_252.33-1~deb12u1_amd64
sysvinit-utils_3.06-4_amd64
t1utils_1.41-4_amd64
tali_1:40.9-1_amd64
tar_1.34+dfsg-1.2+deb12u1_amd64
task-desktop_3.73_all
task-english_3.73_all
task-gnome-desktop_3.73_all
tasksel_3.73_all
tasksel-data_3.73_all
tcl_8.6.13_amd64
tcl8.6_8.6.13+dfsg-2_amd64
tdb-tools_1.4.8-2_amd64
teckit_2.5.11+ds1-1+b1_amd64
tex-common_6.18_all
tex-gyre_20180621-6_all
texlive-base_2022.20230122-3_all
texlive-binaries_2022.20220321.62855-5.1+deb12u2_amd64
texlive-fonts-recommended_2022.20230122-3_all
texlive-latex-base_2022.20230122-3_all
texlive-latex-extra_2022.20230122-4_all
texlive-latex-recommended_2022.20230122-3_all
texlive-pictures_2022.20230122-3_all
texlive-plain-generic_2022.20230122-4_all
texlive-xetex_2022.20230122-3_all
timgm6mb-soundfont_1.3-5_all
tini_0.19.0-1_amd64
tipa_2:1.3-21_all
tk_8.6.13_amd64
tk8.6_8.6.13-2_amd64
tnftp_20210827-4+b1_amd64
totem_43.0-2_amd64
totem-common_43.0-2_all
totem-plugins_43.0-2_amd64
tpm-udev_0.6_all
traceroute_1:2.1.2-1_amd64
tracker_3.4.2-1_amd64
tracker-extract_3.4.3-1_amd64
tracker-miner-fs_3.4.3-1_amd64
transmission-common_3.00-2.1+deb12u1_all
transmission-gtk_3.00-2.1+deb12u1_amd64
tzdata_2024b-0+deb12u1_all
ucf_3.0043+nmu1+deb12u1_all
udev_252.33-1~deb12u1_amd64
udisks2_2.9.4-4_amd64
uno-libs-private_4:7.4.7-1+deb12u5_amd64
unzip_6.0-28_amd64
update-inetd_4.53_all
upower_0.99.20-2_amd64
ure_4:7.4.7-1+deb12u5_amd64
usb-modeswitch_2.6.1-3+b1_amd64
usb-modeswitch-data_20191128-5_all
usb.ids_2024.07.04-0+deb12u1_all
usbmuxd_1.1.1-2_amd64
usbutils_1:014-1+deb12u1_amd64
usr-is-merged_37~deb12u1_all
util-linux_2.38.1-5+deb12u3_amd64
util-linux-extra_2.38.1-5+deb12u3_amd64
util-linux-locales_2.38.1-5+deb12u3_all
va-driver-all_2.17.0-1_amd64
vdpau-driver-all_1.5-2_amd64
vim-common_2:9.0.1378-2_all
vim-tiny_2:9.0.1378-2_amd64
vsftpd_3.0.3-13+b2_amd64
wamerican_2020.12.07-2_all
wdiff_1.2.2-5_amd64
webp-pixbuf-loader_0.2.1-1_amd64
wget_1.21.3-1+b2_amd64
whiptail_0.52.23-1+b1_amd64
wireless-regdb_2022.06.06-1_all
wireplumber_0.4.13-1_amd64
wpasupplicant_2:2.10-12+deb12u2_amd64
x11-apps_7.7+9_amd64
x11-common_1:7.7+23_all
x11-session-utils_7.7+5_amd64
x11-utils_7.7+5_amd64
x11-xkb-utils_7.7+7_amd64
x11-xserver-utils_7.7+9+b1_amd64
xauth_1:1.1.2-1_amd64
xbitmaps_1.1.1-2.2_all
xbrlapi_6.5-7+deb12u1_amd64
xcvt_0.1.2-1_amd64
xdelta_1.1.3-10.4_amd64
xdelta3_3.0.11-dfsg-1.2_amd64
xdg-dbus-proxy_0.1.4-3_amd64
xdg-desktop-portal_1.16.0-2_amd64
xdg-desktop-portal-gnome_43.1-2_amd64
xdg-desktop-portal-gtk_1.14.1-1_amd64
xdg-user-dirs_0.18-1_amd64
xdg-user-dirs-gtk_0.11-1_amd64
xdg-utils_1.1.3-4.1_all
xfonts-100dpi_1:1.0.5_all
xfonts-75dpi_1:1.0.5_all
xfonts-base_1:1.0.5+nmu1_all
xfonts-encodings_1:1.0.4-2.2_all
xfonts-scalable_1:1.0.3-1.3_all
xfonts-utils_1:7.7+6_amd64
xinit_1.4.0-1_amd64
xkb-data_2.35.1-1_all
xkbset_0.6-3_amd64
xml-core_0.18+nmu1_all
xorg_1:7.7+23_amd64
xorg-docs-core_1:1.7.1-1.2_all
xserver-common_2:21.1.7-3+deb12u8_all
xserver-xephyr_2:21.1.7-3+deb12u8_amd64
xserver-xorg_1:7.7+23_amd64
xserver-xorg-core_2:21.1.7-3+deb12u8_amd64
xserver-xorg-input-all_1:7.7+23_amd64
xserver-xorg-input-libinput_1.2.1-1+b1_amd64
xserver-xorg-input-wacom_1.1.0-1_amd64
xserver-xorg-legacy_2:21.1.7-3+deb12u8_amd64
xserver-xorg-video-all_1:7.7+23_amd64
xserver-xorg-video-amdgpu_23.0.0-1_amd64
xserver-xorg-video-ati_1:19.1.0-3_amd64
xserver-xorg-video-fbdev_1:0.5.0-2_amd64
xserver-xorg-video-intel_2:2.99.917+git20210115-1_amd64
xserver-xorg-video-nouveau_1:1.0.17-2_amd64
xserver-xorg-video-qxl_0.1.5+git20200331-3_amd64
xserver-xorg-video-radeon_1:19.1.0-3_amd64
xserver-xorg-video-vesa_1:2.5.0-1+b1_amd64
xserver-xorg-video-vmware_1:13.3.0-3.1+b1_amd64
xterm_379-1_amd64
xwayland_2:22.1.9-1_amd64
xz-utils_5.4.1-0.2_amd64
yelp_42.2-1_amd64
yelp-xsl_42.1-2_all
zenity_3.44.0-1_amd64
zenity-common_3.44.0-1_all
zip_3.0-13_amd64
zlib1g_1:1.2.13.dfsg-1_amd64
zlib1g-dev_1:1.2.13.dfsg-1_amd64
zstd_1.5.4+dfsg2-5_amd64
34022 - SNMP Query Routing Information Disclosure
-
Synopsis
The list of IP routes on the remote host can be obtained via SNMP.
Description
It is possible to obtain the routing information on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.4.21

An attacker may use this information to gain more knowledge about the network topology.
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2008/08/21, Modified: 2023/11/08
Plugin Output

udp/161/snmp


10.10.10.0/255.255.255.0
172.16.16.0/255.255.255.0
172.17.0.0/255.255.0.0
192.168.6.0/255.255.255.0
10550 - SNMP Query Running Process List Disclosure
-
Synopsis
The list of processes running on the remote host can be obtained via SNMP.
Description
It is possible to obtain the list of running processes on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.25.4.2.1.2

An attacker may use this information to gain more knowledge about the target host.
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2000/11/13, Modified: 2023/11/08
Plugin Output

udp/161/snmp


PID CPU MEM COMMAND ARGS
1 1 5156 systemd
2 0 0 kthreadd
3 0 0 rcu_gp
4 0 0 rcu_par_gp
5 0 0 slub_flushwq
6 0 0 netns
8 0 0 kworker/0:0H-events_highpri
10 0 0 mm_percpu_wq
11 0 0 rcu_tasks_kthread
12 0 0 rcu_tasks_rude_kthread
13 0 0 rcu_tasks_trace_kthread
14 0 0 ksoftirqd/0
15 1 0 rcu_preempt
16 0 0 migration/0
18 0 0 cpuhp/0
20 0 0 kdevtmpfs
21 0 0 inet_frag_wq
22 0 0 kauditd
23 0 0 khungtaskd
24 0 0 oom_reaper
27 0 0 writeback
28 0 0 kcompactd0
29 0 0 ksmd
30 0 0 kintegrityd
31 0 0 kblockd
32 0 0 blkcg_punt_bio
33 0 0 tpm_dev_wq
34 0 0 edac-poller
35 0 0 devfreq_wq
36 1 0 kworker/0:1H-kblockd
37 8 0 kswapd0
43 0 0 kthrotld
45 0 0 acpi_thermal_pm
47 0 0 mld
48 0 0 ipv6_addrconf
53 0 0 kstrp
58 0 0 zswap-shrink
59 0 0 kworker/u3:0
116 0 0 scsi_eh_0
117 0 0 scsi_tmf_0
118 0 0 scsi_eh_1
119 0 0 scsi_tmf_1
121 0 0 ata_sff
122 0 0 scsi_eh_2
125 0 0 scsi_tmf_2
126 0 0 scsi_eh_3
127 0 0 scsi_tmf_3
172 0 0 jbd2/sda2-8
173 0 0 ext4-rsv-conver
238 0 5928 systemd-journal
245 0 0 rpciod
247 0 0 xprtiod
259 0 1372 systemd-udevd
350 0 1760 rpcbind -f -w
351 0 1152 systemd-timesyn
356 0 1260 rpc.idmapd
357 0 112 blkmapd
358 0 1084 nfsdcld
369 0 0 cryptd
384 0 5804 accounts-daemon
387 0 1636 avahi-daemon
389 0 1760 cron -f
390 0 3364 dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
392 0 5368 low-memory-moni
394 0 5724 polkitd --no-debug
395 0 4692 power-profiles-
396 0 3508 switcheroo-cont
397 0 3088 systemd-logind
400 0 5032 udisksd
404 0 44 avahi-daemon
426 0 5348 NetworkManager --no-daemon
428 0 1840 wpa_supplicant -u -s -O DIR=/run/wpa_supplicant GROUP=netdev
454 0 0 psimon
461 0 5120 ModemManager
562 0 2396 cupsd -l
563 49 162336 java -jar /opt/jenkins/jenkins.war --httpPort=8080
566 1 2028 named -f -u bind
569 0 2268 bash /usr/local/bin/redis_purchases.sh
570 12 2612 redis-server
575 0 1420 vsftpd /etc/vsftpd.conf
601 1 9360 containerd
617 0 2988 sshd
648 0 5696 gdm3
695 0 4800 gdm-session-wor
729 0 4488 cups-browsed
735 3 4132 snmpd -LOw -u Debian-snmp -g Debian-snmp -I -smux mteTrigger mteTriggerConf -f
741 0 1464 rpc.statd
759 0 2272 rpc.mountd
767 0 0 lockd
771 0 0 nfsd
774 0 0 nfsd
778 0 0 nfsd
782 0 0 nfsd
783 0 0 nfsd
785 0 0 nfsd
786 0 3296 systemd --user
788 0 268 (sd-pam)
792 0 0 nfsd
793 0 0 nfsd
829 1 1608 mariadbd
830 0 2548 pipewire
832 0 5312 wireplumber
833 0 3632 pipewire-pulse
835 0 1760 dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
846 0 4472 gdm-wayland-ses dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
849 0 288 dbus-run-sessio -- gnome-session --autostart /usr/share/gdm/greeter/autostart
850 0 2168 dbus-daemon --nofork --print-address 4 --session
851 0 4472 gnome-session-b --autostart /usr/share/gdm/greeter/autostart
853 0 104 rtkit-daemon
856 0 4336 gvfsd
864 0 3980 gvfsd-fuse /run/user/111/gvfs -f
884 17 28956 gnome-shell
885 1 3312 dockerd -H fd:// --containerd=/run/containerd/containerd.sock
919 0 1460 apache2 -k start
941 0 4812 at-spi-bus-laun
947 0 2124 dbus-daemon --config-file=/usr/share/defaults/at-spi2/accessibility.conf --nofork --print-address 11 --address=unix:path=/run/user/111/at-sp
957 0 1972 nmbd --foreground --no-process-group
958 0 1468 Xwayland :1024 -rootless -noreset -accessx -core -auth /run/user/111/.mutter-Xwaylandauth.XU8YA3 -listenfd 4 -listenfd 5 -displayfd 6 -in
965 0 2760 apache2 -k start
967 0 2464 apache2 -k start
970 0 2864 apache2 -k start
971 0 2620 apache2 -k start
975 0 2520 apache2 -k start
1004 0 4312 xdg-permission-
1064 0 5244 upowerd
1112 0 4848 gjs /usr/share/gnome-shell/org.gnome.Shell.Notifications
1114 0 4832 colord
1116 0 4704 at-spi2-registr --use-gnome-session
1127 0 4724 gsd-sharing
1130 0 5076 gsd-wacom
1135 0 4988 gsd-color
1139 0 5124 gsd-keyboard
1142 0 4688 gsd-print-notif
1143 0 4796 gsd-rfkill
1145 0 4376 gsd-smartcard
1152 0 4756 gsd-datetime
1154 0 5128 gsd-media-keys
1159 0 4608 gsd-screensaver
1161 0 4516 gsd-sound
1167 0 4680 gsd-a11y-settin
1170 0 2476 smbd --foreground --no-process-group
1178 0 4940 gsd-housekeepin
1185 0 5032 gsd-power
1217 0 4596 gsd-printer
1252 0 6960 tracker-miner-f
1340 0 1424 smbd-notifyd --foreground --no-process-group
1341 0 1116 cleanupd --foreground --no-process-group
1530 0 4840 gjs /usr/share/gnome-shell/org.gnome.ScreenSaver
1897 0 1628 master -w
1987 0 1528 qmgr -l -t unix -u
2053 0 4780 ibus-daemon --panel disable -r --xim
2060 0 4844 ibus-dconf
2061 1 4880 ibus-extension-
2064 0 4836 ibus-x11 --kill-daemon
2068 0 5220 gvfs-udisks2-vo
2069 0 4668 ibus-portal
2080 0 5152 gvfs-mtp-volume
2086 0 4840 gvfs-goa-volume
2090 0 4600 goa-daemon
2097 0 4540 goa-identity-se
2099 0 5072 gvfs-gphoto2-vo
2108 0 4668 gvfs-afc-volume
2124 0 4832 ibus-engine-sim
3407 0 0 kworker/u2:0-flush-8:0
3914 0 0 kworker/0:1-rcu_gp
4060 0 0 kworker/0:2-events
4177 0 2120 pickup -l -t unix -u -c
4242 0 0 kworker/u2:1-ext4-rsv-conversion
4520 0 0 kworker/u2:2-flush-8:0
4552 0 2504 smtpd -n smtp -t inet -u -c -o stress= -s 2
4553 0 1960 proxymap -t unix -u
4556 0 0 kworker/0:0-inet_frag_wq
4575 0 0 kworker/u2:3-flush-8:0
4576 0 0 kworker/u2:4-flush-8:0
4631 0 2628 apache2 -k start
4653 0 0 kworker/0:3-events
4663 0 0 kworker/u2:5-ext4-rsv-conversion
4768 0 3328 apache2 -k start
4769 0 3340 trivial-rewrite -n rewrite -t unix -u -c
4770 0 3576 cleanup -z -t unix -u -c
4771 0 4560 smtpd -n smtp -t inet -u -c -o stress= -s 2
4799 0 0 kworker/u2:6-writeback
4825 0 868 sleep 120
10800 - SNMP Query System Information Disclosure
-
Synopsis
The System Information of the remote host can be obtained via SNMP.
Description
It is possible to obtain the system information about the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1.

An attacker may use this information to gain more knowledge about the target host.
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2001/11/06, Modified: 2023/11/08
Plugin Output

udp/161/snmp

System information :
sysDescr : Linux debian 6.1.0-29-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01-02) x86_64
sysObjectID : 1.3.6.1.4.1.8072.3.2.10
sysUptime : 0d 0h 12m 14s
sysContact : root
sysName : debian
sysLocation : Jenkins currently sends SNMP traps for network control, for more information --> http//:192.168.1.11:8080 (admin:Adm1n20255up3rs3cuR3)
sysServices : 72
10551 - SNMP Request Network Interfaces Enumeration
-
Synopsis
The list of network interfaces cards of the remote host can be obtained via SNMP.
Description
It is possible to obtain the list of the network interfaces installed on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0

An attacker may use this information to gain more knowledge about the target host.
Solution
Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port.
Risk Factor
None
Plugin Information
Published: 2000/11/13, Modified: 2023/11/08
Plugin Output

udp/161/snmp


Interface 1 information :
ifIndex : 1
ifDescr : lo
ifPhysAddress :


Interface 2 information :
ifIndex : 2
ifDescr : ens18
ifPhysAddress : bc2411b5f94a


Interface 3 information :
ifIndex : 3
ifDescr : br-5f849a843b5e
ifPhysAddress : e6ac88e0be66


Interface 4 information :
ifIndex : 4
ifDescr : docker0
ifPhysAddress : 7effb7bff3cc


Interface 5 information :
ifIndex : 5
ifDescr : br-e40f7a9aad46
ifPhysAddress : aafa9e7803ef
185519 - SNMP Server Detection
-
Synopsis
An SNMP server is listening on the remote host.
Description
The remote service is an SNMP agent which provides management data about the device.
See Also
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Published: 2023/11/14, Modified: 2023/11/14
Plugin Output

udp/161/snmp

Nessus detected the following SNMP versions:
- SNMPv1 (public community)
- SNMPv1 (configured community)
- SNMPv2c (public community)
- SNMPv2c (configured community)
- SNMPv3
40448 - SNMP Supported Protocols Detection
-
Synopsis
This plugin reports all the protocol versions successfully negotiated with the remote SNMP agent.
Description
Extend the SNMP settings data already gathered by testing for\ SNMP versions other than the highest negotiated.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/07/31, Modified: 2023/11/08
Plugin Output

udp/161/snmp

This host supports SNMP version SNMPv1.
This host supports SNMP version SNMPv2c.
This host supports SNMP version SNMPv3.

70657 - SSH Algorithms and Languages Supported
-
Synopsis
An SSH server is listening on this port.
Description
This script detects which algorithms and languages are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/10/28, Modified: 2025/01/20
Plugin Output

tcp/22/ssh


Nessus negotiated the following encryption algorithm(s) with the server :

Client to Server: aes256-ctr
Server to Client: aes256-ctr

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for server_host_key_algorithms :

ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-ed25519

The server supports the following options for encryption_algorithms_client_to_server :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for kex_algorithms :

curve25519-sha256
curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
kex-strict-s-v00@openssh.com
sntrup761x25519-sha512
sntrup761x25519-sha512@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
149334 - SSH Password Authentication Accepted
-
Synopsis
The SSH server on the remote host accepts password authentication.
Description
The SSH server on the remote host accepts password authentication.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2021/05/07, Modified: 2021/05/07
Plugin Output

tcp/22/ssh

10881 - SSH Protocol Versions Supported
-
Synopsis
A SSH server is running on the remote host.
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/03/06, Modified: 2024/07/24
Plugin Output

tcp/22/ssh

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0
153588 - SSH SHA-1 HMAC Algorithms Enabled
-
Synopsis
The remote SSH server is configured to enable SHA-1 HMAC algorithms.
Description
The remote SSH server is configured to enable SHA-1 HMAC algorithms.

Although NIST has formally deprecated use of SHA-1 for digital signatures, SHA-1 is still considered secure for HMAC as the security of HMAC does not rely on the underlying hash function being resistant to collisions.

Note that this plugin only checks for the options of the remote SSH server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2021/09/23, Modified: 2022/04/05
Plugin Output

tcp/22/ssh


The following client-to-server SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are supported :

hmac-sha1
hmac-sha1-etm@openssh.com

The following server-to-client SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are supported :

hmac-sha1
hmac-sha1-etm@openssh.com
10267 - SSH Server Type and Version Information
-
Synopsis
An SSH server is listening on this port.
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0933
Plugin Information
Published: 1999/10/12, Modified: 2024/07/24
Plugin Output

tcp/22/ssh


SSH version : SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u4
SSH supported authentication : publickey,password

25240 - Samba Server Detection
-
Synopsis
An SMB server is running on the remote host.
Description
The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/05/16, Modified: 2022/10/12
Plugin Output

tcp/445/cifs

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/25/smtp

An SMTP server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/80/www

A web server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/8080/www

A web server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/8081/www

A web server is running on this port.

17975 - Service Detection (GET request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0935
Plugin Information
Published: 2005/04/06, Modified: 2021/10/27
Plugin Output

tcp/6379/redis_server

The remote service appears to be a Redis server, an open source,
persistent key-value data store.

11153 - Service Detection (HELP Request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2024/11/19
Plugin Output

tcp/21/ftp

An FTP server seems to be running on this port.

11153 - Service Detection (HELP Request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2024/11/19
Plugin Output

tcp/22/ssh

An SSH server seems to be running on this port.

11153 - Service Detection (HELP Request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2024/11/19
Plugin Output

tcp/3306/mysql

A MySQL server is running on this port.

25220 - TCP/IP Timestamps Supported
-
Synopsis
The remote service implements TCP timestamps.
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/05/16, Modified: 2023/10/17
Plugin Output

tcp/0

110723 - Target Credential Status by Authentication Protocol - No Credentials Provided
-
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the authentication protocol may be invalid. See plugin output for error details.

Please note the following :

- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were provided for an available SNMP service.

- Providing valid credentials for all available authentication protocols may improve scan coverage, but the value of successful authentication for a given protocol may vary from target to target depending upon what data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for Windows targets than for Linux targets.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0504
Plugin Information
Published: 2018/06/27, Modified: 2024/04/19
Plugin Output

tcp/0

SSH was detected on port 22 but no credentials were provided.
SSH local checks were not enabled.

10287 - Traceroute Information
-
Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/11/27, Modified: 2023/12/04
Plugin Output

udp/0

For your information, here is the traceroute from 192.168.6.10 to 192.168.6.11 :
192.168.6.10
192.168.6.11

Hop Count: 1

135860 - WMI Not Available
-
Synopsis
WMI queries could not be made against the remote host.
Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI queries are used to gather information about the remote host, such as its current state, network interface configuration, etc.

Without this information Nessus may not be able to identify installed software or security vunerabilities that exist on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2020/04/21, Modified: 2025/07/21
Plugin Output

tcp/445/cifs

Can't connect to the 'root\CIMV2' WMI namespace.

85601 - Web Application Cookies Not Marked HttpOnly
-
Synopsis
HTTP session cookies might be vulnerable to cross-site scripting attacks.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, one or more of those cookies are not marked 'HttpOnly', meaning that a malicious client-side script, such as JavaScript, could read them. The HttpOnly flag is a security mechanism to protect against cross-site scripting attacks, which was proposed by Microsoft and initially implemented in Internet Explorer. All modern browsers now support it.

Note that this plugin detects all general cookies missing the HttpOnly cookie flag, whereas plugin 48432 (Web Application Session Cookies Not Marked HttpOnly) will only detect session cookies from an authenticated session missing the HttpOnly cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, add the 'HttpOnly' attribute to all session cookies and any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/80/www


The following cookie does not set the HttpOnly cookie flag :

Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85601 - Web Application Cookies Not Marked HttpOnly
-
Synopsis
HTTP session cookies might be vulnerable to cross-site scripting attacks.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, one or more of those cookies are not marked 'HttpOnly', meaning that a malicious client-side script, such as JavaScript, could read them. The HttpOnly flag is a security mechanism to protect against cross-site scripting attacks, which was proposed by Microsoft and initially implemented in Internet Explorer. All modern browsers now support it.

Note that this plugin detects all general cookies missing the HttpOnly cookie flag, whereas plugin 48432 (Web Application Session Cookies Not Marked HttpOnly) will only detect session cookies from an authenticated session missing the HttpOnly cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, add the 'HttpOnly' attribute to all session cookies and any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8080/www


The following cookie does not set the HttpOnly cookie flag :

Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85601 - Web Application Cookies Not Marked HttpOnly
-
Synopsis
HTTP session cookies might be vulnerable to cross-site scripting attacks.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, one or more of those cookies are not marked 'HttpOnly', meaning that a malicious client-side script, such as JavaScript, could read them. The HttpOnly flag is a security mechanism to protect against cross-site scripting attacks, which was proposed by Microsoft and initially implemented in Internet Explorer. All modern browsers now support it.

Note that this plugin detects all general cookies missing the HttpOnly cookie flag, whereas plugin 48432 (Web Application Session Cookies Not Marked HttpOnly) will only detect session cookies from an authenticated session missing the HttpOnly cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, add the 'HttpOnly' attribute to all session cookies and any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8081/www


The following cookie does not set the HttpOnly cookie flag :

Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85602 - Web Application Cookies Not Marked Secure
-
Synopsis
HTTP session cookies might be transmitted in cleartext.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, there are instances where the application is running over unencrypted HTTP or the cookies are not marked 'secure', meaning the browser could send them back over an unencrypted link under certain circumstances. As a result, it may be possible for a remote attacker to intercept these cookies.

Note that this plugin detects all general cookies missing the 'secure'
cookie flag, whereas plugin 49218 (Web Application Session Cookies Not Marked Secure) will only detect session cookies from an authenticated session missing the secure cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, ensure all communication occurs over an encrypted channel and add the 'secure' attribute to all session cookies or any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:522
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/80/www


The following cookies do not set the secure cookie flag :

Name : JSESSIONID.fd7253a8
Path : /
Value : node08nuzeyr684pyzzjrcvygubf41296.node0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 1
Port :


Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85602 - Web Application Cookies Not Marked Secure
-
Synopsis
HTTP session cookies might be transmitted in cleartext.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, there are instances where the application is running over unencrypted HTTP or the cookies are not marked 'secure', meaning the browser could send them back over an unencrypted link under certain circumstances. As a result, it may be possible for a remote attacker to intercept these cookies.

Note that this plugin detects all general cookies missing the 'secure'
cookie flag, whereas plugin 49218 (Web Application Session Cookies Not Marked Secure) will only detect session cookies from an authenticated session missing the secure cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, ensure all communication occurs over an encrypted channel and add the 'secure' attribute to all session cookies or any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:522
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8080/www


The following cookies do not set the secure cookie flag :

Name : JSESSIONID.fd7253a8
Path : /
Value : node08nuzeyr684pyzzjrcvygubf41296.node0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 1
Port :


Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85602 - Web Application Cookies Not Marked Secure
-
Synopsis
HTTP session cookies might be transmitted in cleartext.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, there are instances where the application is running over unencrypted HTTP or the cookies are not marked 'secure', meaning the browser could send them back over an unencrypted link under certain circumstances. As a result, it may be possible for a remote attacker to intercept these cookies.

Note that this plugin detects all general cookies missing the 'secure'
cookie flag, whereas plugin 49218 (Web Application Session Cookies Not Marked Secure) will only detect session cookies from an authenticated session missing the secure cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, ensure all communication occurs over an encrypted channel and add the 'secure' attribute to all session cookies or any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:522
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8081/www


The following cookies do not set the secure cookie flag :

Name : JSESSIONID.fd7253a8
Path : /
Value : node08nuzeyr684pyzzjrcvygubf41296.node0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 1
Port :


Name : PHPSESSID
Path : /
Value : 9ce0r75tgpujv36bupfhrhjkqf
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

91815 - Web Application Sitemap
-
Synopsis
The remote web server hosts linkable content that can be crawled by Nessus.
Description
The remote web server contains linkable content that can be used to gather information about a target.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2016/06/24, Modified: 2016/06/24
Plugin Output

tcp/80/www


The following sitemap was created from crawling linkable content on the target host :

- http://192.168.6.11/
- http://192.168.6.11/access.php
- http://192.168.6.11/docs.php
- http://192.168.6.11/feedback.php
- http://192.168.6.11/includes/
- http://192.168.6.11/includes/ATM_Network_Overview_-_Certisysnet_Bank.txt
- http://192.168.6.11/includes/ATM_Operations_Summary.txt
- http://192.168.6.11/includes/Upcoming_Release%3A_CertiBank_Mobile.bak
- http://192.168.6.11/index.php
- http://192.168.6.11/integrations.php
- http://192.168.6.11/partners.php
- http://192.168.6.11/payments.php
- http://192.168.6.11/portfolio.php
- http://192.168.6.11/profile.php
- http://192.168.6.11/style.css
- http://192.168.6.11/templates/
- http://192.168.6.11/transactions.php
- http://192.168.6.11/upload.php
- http://192.168.6.11/uploads/
- http://192.168.6.11/uploads/%2522%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522%09and%09sleep(7)%231
- http://192.168.6.11/uploads/%2522%09and%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522%09or%09sleep(7)%231
- http://192.168.6.11/uploads/%2522%09or%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/%2522%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522%20and%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/%2522%20and%20sleep(7)%231
- http://192.168.6.11/uploads/%2522%20and%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/%2522%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522%20or%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/%2522%20or%20sleep(7)%231
- http://192.168.6.11/uploads/%2522%20or%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%2522%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/%2522%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%2522)%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522)%09and%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522)%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522)%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522)%09or%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522)%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/%2522)%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522)%20and%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522)%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522)%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/%2522)%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522)%20or%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522)%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%2522)%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/%2522)%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%2522))%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522))%09and%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522))%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522))%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522))%09or%09sleep(7)=%2522
- http://192.168.6.11/uploads/%2522))%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/%2522))%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522))%20and%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522))%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/%2522))%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/%2522))%20or%20sleep(7)=%2522
- http://192.168.6.11/uploads/%2522))%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%2522))%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/%2522))%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%3Benv%3B
- http://192.168.6.11/uploads/%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/%7cenv
- http://192.168.6.11/uploads/&ping%20-n%2025%20127.0.0.1&
- http://192.168.6.11/uploads/&set&
- http://192.168.6.11/uploads/'%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/'%09and%09sleep(7)%231
- http://192.168.6.11/uploads/'%09and%09sleep(7)='
- http://192.168.6.11/uploads/'%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/'%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/'%09or%09sleep(7)%231
- http://192.168.6.11/uploads/'%09or%09sleep(7)='
- http://192.168.6.11/uploads/'%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/'%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/'%20and%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/'%20and%20sleep(7)%231
- http://192.168.6.11/uploads/'%20and%20sleep(7)='
- http://192.168.6.11/uploads/'%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/'%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/'%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/'%20or%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/'%20or%20sleep(7)%231
- http://192.168.6.11/uploads/'%20or%20sleep(7)='
- http://192.168.6.11/uploads/'%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/'%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/'%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/')%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/')%09and%09sleep(7)='
- http://192.168.6.11/uploads/')%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/')%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/')%09or%09sleep(7)='
- http://192.168.6.11/uploads/')%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/')%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/')%20and%20sleep(7)='
- http://192.168.6.11/uploads/')%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/')%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/')%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/')%20or%20sleep(7)='
- http://192.168.6.11/uploads/')%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/')%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/')%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/'))%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/'))%09and%09sleep(7)='
- http://192.168.6.11/uploads/'))%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/'))%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/'))%09or%09sleep(7)='
- http://192.168.6.11/uploads/'))%20and%20(SELECT%20*%20FROM%20%5bODBC%3BDRIVER=SQL%20SERVER%3BServer=1.1.1.1%3BDATABASE=w%5d.a.p)
- http://192.168.6.11/uploads/'))%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/'))%20and%20sleep(7)='
- http://192.168.6.11/uploads/'))%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/'))%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/'))%20or%20sleep(7)='
- http://192.168.6.11/uploads/'))%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/'))%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/'))%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/'0%3A0%3A7'--1
- http://192.168.6.11/uploads/)%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/)%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/)%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/)%3e
- http://192.168.6.11/uploads/))%3Bwaitfor%09delay%09'0%3A0%3A7'--1
- http://192.168.6.11/uploads/))%3Bwaitfor%20delay%20'0%3A0%3A7'--%250A1
- http://192.168.6.11/uploads/))%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/1%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1%09and%09sleep(7)%231
- http://192.168.6.11/uploads/1%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1%09or%09sleep(7)%231
- http://192.168.6.11/uploads/1%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1%20and%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1%20and%20sleep(7)%231
- http://192.168.6.11/uploads/1%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/1%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1%20or%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1%20or%20sleep(7)%231
- http://192.168.6.11/uploads/1)%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1)%09and%09sleep(7)%231
- http://192.168.6.11/uploads/1)%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1)%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1)%09or%09sleep(7)%231
- http://192.168.6.11/uploads/1)%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1)%20and%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1)%20and%20sleep(7)%231
- http://192.168.6.11/uploads/1)%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1)%20or%20pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/1)%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1)%20or%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1)%20or%20sleep(7)%231
- http://192.168.6.11/uploads/1))%09and%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1))%09and%09sleep(7)%231
- http://192.168.6.11/uploads/1))%09or%09benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1))%09or%09pg_sleep(7)--1
- http://192.168.6.11/uploads/1))%09or%09sleep(7)%231
- http://192.168.6.11/uploads/1))%20and%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1))%20and%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1))%20and%20sleep(7)%231
- http://192.168.6.11/uploads/1))%20or%20benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/1))%20or%20pg_sleep(7)--1
- http://192.168.6.11/uploads/1))%20or%20sleep(7)%23%250A1
- http://192.168.6.11/uploads/1))%20or%20sleep(7)%231
- http://192.168.6.11/uploads/CertisysnetBank_2020bak.kdbx
- http://192.168.6.11/uploads/CertisysnetBank_Oldpass.kdbx
- http://192.168.6.11/uploads/CertisysnetBank_Vault.kdbx
- http://192.168.6.11/uploads/Pg==
- http://192.168.6.11/uploads/ScRiPt%3e
- http://192.168.6.11/uploads/Script%3e
- http://192.168.6.11/uploads/a%3Benv%3B
- http://192.168.6.11/uploads/a%3Bsleep%2060%3B
- http://192.168.6.11/uploads/a%3e%3cImG%20src=z%20oNeRror=alert(%2522wgfrv3f5tq%2522)%3e
- http://192.168.6.11/uploads/a%3e%3cImG%20src=z%20oNeRror=alert('wgfrv3f5tq')%3e
- http://192.168.6.11/uploads/a%3e%3cSvG%250AoNloAd=alert('wgfrv3f5tq')%3e
- http://192.168.6.11/uploads/a%60)%60
- http://192.168.6.11/uploads/a%60sleep%2060%60
- http://192.168.6.11/uploads/a%7csleep%2060%3B
- http://192.168.6.11/uploads/a)%3Benv%3B
- http://192.168.6.11/uploads/benchmark(10000000%2CMD5(1))%231
- http://192.168.6.11/uploads/content.xml
- http://192.168.6.11/uploads/e
- http://192.168.6.11/uploads/e.php
- http://192.168.6.11/uploads/env
- http://192.168.6.11/uploads/env%7c
- http://192.168.6.11/uploads/passwd
- http://192.168.6.11/uploads/pg_sleep(7)--%250A1
- http://192.168.6.11/uploads/pg_sleep(7)--1
- http://192.168.6.11/uploads/pix.gif
- http://192.168.6.11/uploads/pix.gif%20waitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/pix.gif%250Aenv%3B
- http://192.168.6.11/uploads/pix.gif%2Csleep(7)%231
- http://192.168.6.11/uploads/pix.gif%3Benv%3B
- http://192.168.6.11/uploads/pix.gif%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/pix.gif%60%2Csleep(7)%231
- http://192.168.6.11/uploads/pix.gif%c2%bf'%2522(
- http://192.168.6.11/uploads/pix.gif)%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/pix.gif))%3Bwaitfor%20delay%20'0%3A0%3A7'--1
- http://192.168.6.11/uploads/sCrIpT%3e
- http://192.168.6.11/uploads/services
- http://192.168.6.11/uploads/services%3A%3A%24DATA
- http://192.168.6.11/uploads/set
- http://192.168.6.11/uploads/sfish1.gif
- http://192.168.6.11/uploads/sfish10.gif
- http://192.168.6.11/uploads/sfish15.gif
- http://192.168.6.11/uploads/sfish2.gif
- http://192.168.6.11/uploads/sfish6.gif
- http://192.168.6.11/uploads/sleep(7)%23%250A1
- http://192.168.6.11/uploads/sleep(7)%231
- http://192.168.6.11/uploads/sleep(7)=%2522
- http://192.168.6.11/uploads/sleep(7)='
- http://192.168.6.11/uploads/upload.php
- http://192.168.6.11/uploads/upload.php%3A%3A%24DATA
- http://192.168.6.11/uploads/wgfrv3f5tq

Attached is a copy of the sitemap file.

91815 - Web Application Sitemap
-
Synopsis
The remote web server hosts linkable content that can be crawled by Nessus.
Description
The remote web server contains linkable content that can be used to gather information about a target.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2016/06/24, Modified: 2016/06/24
Plugin Output

tcp/8081/www


The following sitemap was created from crawling linkable content on the target host :

- http://192.168.6.11:8081/
- http://192.168.6.11:8081/csrf_attack.html

Attached is a copy of the sitemap file.

11032 - Web Server Directory Enumeration
-
Synopsis
It is possible to enumerate directories on the web server.
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information
Published: 2002/06/26, Modified: 2024/06/07
Plugin Output

tcp/80/www


The following directories were discovered:
/cgi-bin, /includes, /icons, /templates, /uploads

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

11032 - Web Server Directory Enumeration
-
Synopsis
It is possible to enumerate directories on the web server.
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information
Published: 2002/06/26, Modified: 2024/06/07
Plugin Output

tcp/8081/www


The following directories were discovered:
/cgi-bin, /icons

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

10302 - Web Server robots.txt Information Disclosure
-
Synopsis
The remote web server contains a 'robots.txt' file.
Description
The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes. A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.
See Also
Solution
Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.
Risk Factor
None
Plugin Information
Published: 1999/10/12, Modified: 2018/11/15
Plugin Output

tcp/8080/www

Contents of robots.txt :

# we don't want robots to click "build" links
User-agent: *
Disallow: /

10662 - Web mirroring
-
Synopsis
Nessus can crawl the remote website.
Description
This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host.

It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/05/04, Modified: 2025/07/14
Plugin Output

tcp/80/www


Webmirror performed 228 queries in 2s (114.000 queries per second)

The following CGIs have been discovered :


+ CGI : /portfolio.php
Methods : POST
Argument : user


+ CGI : /integrations.php
Methods : GET
Argument : page
Value: services/security.php


+ CGI : /partners.php
Methods : GET
Argument : url
Value: https://www.bis.org


+ CGI : /docs.php
Methods : GET
Argument : file
Value: bank_news.txt


+ CGI : /transactions.php
Methods : POST
Argument : transaction_id


+ CGI : /transfer_funds.php
Methods : POST
Argument : amount
Argument : from_account
Argument : to_account


+ CGI : /profile.php
Methods : POST
Argument : card_number
Argument : pin
Argument : username


+ CGI : /upload.php
Methods : POST
Argument : file


+ CGI : /access.php
Methods : POST
Argument : password
Argument : username


+ CGI : /feedback.php
Methods : POST
Argument : feedback

Directory index found at /uploads/
Directory index found at /templates/
Directory index found at /includes/

10662 - Web mirroring
-
Synopsis
Nessus can crawl the remote website.
Description
This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host.

It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/05/04, Modified: 2025/07/14
Plugin Output

tcp/8081/www


Webmirror performed 4 queries in 1s (4.000 queries per second)

The following CGIs have been discovered :

Directory index found at /

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
-
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/10/12, Modified: 2021/02/10
Plugin Output

udp/137/netbios-ns

The following 7 NetBIOS names have been gathered :

DEBIAN = Computer name
DEBIAN = Messenger Service
DEBIAN = File Server Service
__MSBROWSE__ = Master Browser
WORKGROUP = Workgroup / Domain name
WORKGROUP = Master Browser
WORKGROUP = Browser Service Elections

This SMB server seems to be a Samba server - its MAC address is NULL.

66717 - mDNS Detection (Local Network)
-
Synopsis
It is possible to obtain information about the remote host.
Description
The remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which allows anyone to uncover information from the remote host such as its operating system type and exact version, its hostname, and the list of services it is running.

This plugin attempts to discover mDNS used by hosts residing on the same network segment as Nessus.
Solution
Filter incoming traffic to UDP port 5353, if desired.
Risk Factor
None
Plugin Information
Published: 2013/05/31, Modified: 2013/05/31
Plugin Output

udp/5353/mdns

Nessus was able to extract the following information :

- mDNS hostname : debian.local.

- Advertised services :
o Service name : DEBIAN._smb._tcp.local.
Port number : 445
o Service name : DEBIAN._device-info._tcp.local.
Port number : 0

52703 - vsftpd Detection
-
Synopsis
An FTP server is listening on the remote port.
Description
The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/03/17, Modified: 2019/11/22
Plugin Output

tcp/21/ftp


Source : 220 (vsFTPd 3.0.3)
Version : 3.0.3
© 2025 Tenable™, Inc. All rights reserved.