Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
run /
ubuntu-advantage /
[ HOME SHELL ]
Name
Size
Permission
Action
notices
[ DIR ]
drwxr-xr-x
aptnews.json
2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : aptnews.json
{ "messages": [ { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["xenial"], "packages": [ ["libfreetype6", "<", "2.6.1-0.1ubuntu2.5+esm2"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["bionic"], "packages": [ ["libfreetype6", "<", "2.8.1-2ubuntu2.2+esm1"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["focal"], "packages": [ ["libfreetype6", "<", "2.10.1-2ubuntu0.4"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["jammy"], "packages": [ ["libfreetype6", "<", "2.11.1+dfsg-1ubuntu0.3"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] } ] }
Close