shell bypass 403
UnknownSec Shell
:
/
proc
/
self
/
root
/
opt
/
cpanel
/
ea-ruby27
/
root
/
usr
/
share
/
ruby
/
ruby-2.7.8
/
rexml
/
dtd
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
elementdecl.rb
# frozen_string_literal: false require_relative "../child" module REXML module DTD class ElementDecl < Child START = "<!ELEMENT" START_RE = /^\s*#{START}/um # PATTERN_RE = /^\s*(#{START}.*?)>/um PATTERN_RE = /^\s*#{START}\s+((?:[:\w][-\.\w]*:)?[-!\*\.\w]*)(.*?)>/ #\s*((((["']).*?\5)|[^\/'">]*)*?)(\/)?>/um, true) def initialize match @name = match[1] @rest = match[2] end end end end
© 2025 UnknownSec