Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
openscap /
schemas /
cve /
[ HOME SHELL ]
Name
Size
Permission
Action
cce_0.1.xsd
2.85
KB
-rw-r--r--
cpe-language_2.1.xsd
8.14
KB
-rw-r--r--
cve_0.1.xsd
3.22
KB
-rw-r--r--
cvss-v2_0.2.xsd
17.27
KB
-rw-r--r--
nvd-cve-feed_2.0.xsd
2.43
KB
-rw-r--r--
patch_0.1.xsd
3.55
KB
-rw-r--r--
scap-core_0.1.xsd
7.6
KB
-rw-r--r--
vulnerability_0.4.xsd
14.73
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cve_0.1.xsd
<?xml version="1.0" encoding="UTF-8"?> <!-- == Model: Version 0-3 NetD == Package: cve --> <xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://scap.nist.gov/schema/cve/0.1" xmlns:scap_core="http://scap.nist.gov/schema/scap-core/0.1" targetNamespace="http://scap.nist.gov/schema/cve/0.1" elementFormDefault="qualified" attributeFormDefault="unqualified" version="0.1"> <xsd:import namespace="http://scap.nist.gov/schema/scap-core/0.1" schemaLocation="scap-core_0.1.xsd"/> <!-- ================================================== --> <!-- ===== Simple Type Definitions --> <!-- ================================================== --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <!-- CVE_Name_Type <<simpleType>> --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <xsd:simpleType name="cveNamePatternType"> <xsd:annotation> <xsd:documentation>Format for CVE Names is CVE-YYYY-NNNN, where YYYY is the year of publication and NNNN is a sequence number.</xsd:documentation> </xsd:annotation> <xsd:restriction base="xsd:token"> <xsd:pattern value="CVE-([1,2])\d{3}-\d{4}"/> </xsd:restriction> </xsd:simpleType> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <!-- CVE_Status <<simpleType>> --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <xsd:simpleType name="cveStatus"> <xsd:annotation> <xsd:documentation>Enumeration containing valid values for CVE status: Candidate, Entry, and Deprecated</xsd:documentation> </xsd:annotation> <xsd:restriction base="xsd:token"> <xsd:enumeration value="CANDIDATE"/> <xsd:enumeration value="ENTRY"/> <xsd:enumeration value="DEPRECATED"/> </xsd:restriction> </xsd:simpleType> <!-- ================================================== --> <!-- ===== Complex Type Definitions --> <!-- ================================================== --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <!-- CVE --> <!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ --> <xsd:complexType name="cveType"> <xsd:sequence> <xsd:element name="status" type="cveStatus" minOccurs="0"> <xsd:annotation> <xsd:documentation>Status of Vulnerability -- Candidate, Entry, Deprecated</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="description" type="xsd:string" minOccurs="0"> <xsd:annotation> <xsd:documentation>Free text field to describe the vulnerability</xsd:documentation> </xsd:annotation> </xsd:element> <xsd:element name="references" type="scap_core:referenceType" maxOccurs="unbounded" minOccurs="0"> <xsd:annotation> <xsd:documentation>Discretionary information and links relevant to a given vulnerability referenced by the CVE</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> <xsd:attribute name="id" type="cveNamePatternType" use="required"> <xsd:annotation> <xsd:documentation>CVE name in the CVE-YYYY-NNNN format</xsd:documentation> </xsd:annotation> </xsd:attribute> </xsd:complexType> </xsd:schema>
Close