File manager - Edit - /home/aresglob/public_html/wp/wp-includes/images/smilies/SECURITY.md.tar
Back
home/aresglob/public_html/wp/wp-content/themes/astra/SECURITY.md 0000644 00000000653 15103656460 0020522 0 ustar 00 # Security Policy Thank you for your interest in helping us improve the security of our open source products, websites and other properties. ## How can I report a security bug? We take plugin security extremely seriously. If you discover a security vulnerability, please report it in a safe and responsible manner. You can report the issue through our [Bug Bounty Program](https://brainstormforce.com/bug-bounty-program/). home/aresglob/public_html/wp/wp-content/plugins/astra-sites/SECURITY.md 0000644 00000000653 15111727726 0022046 0 ustar 00 # Security Policy Thank you for your interest in helping us improve the security of our open source products, websites and other properties. ## How can I report a security bug? We take plugin security extremely seriously. If you discover a security vulnerability, please report it in a safe and responsible manner. You can report the issue through our [Bug Bounty Program](https://brainstormforce.com/bug-bounty-program/). plugins/file-manager-advanced/application/svg-sanitizer/includes/phpunit/phpunit/SECURITY.md 0000644 00000004371 15113161444 0035706 0 ustar 00 home/aresglob/public_html/wp/wp-content # Security Policy If you believe you have found a security vulnerability in PHPUnit, please report it to us through coordinated disclosure. **Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.** Instead, please email `sebastian@phpunit.de`. Please include as much of the information listed below as you can to help us better understand and resolve the issue: * The type of issue * Full paths of source file(s) related to the manifestation of the issue * The location of the affected source code (tag/branch/commit or direct URL) * Any special configuration required to reproduce the issue * Step-by-step instructions to reproduce the issue * Proof-of-concept or exploit code (if possible) * Impact of the issue, including how an attacker might exploit the issue This information will help us triage your report more quickly. ## Web Context PHPUnit is a framework for writing as well as a command-line tool for running tests. Writing and running tests is a development-time activity. There is no reason why PHPUnit should be installed on a webserver and/or in a production environment. **If you upload PHPUnit to a webserver then your deployment process is broken. On a more general note, if your `vendor` directory is publicly accessible on your webserver then your deployment process is also broken.** Please note that if you upload PHPUnit to a webserver "bad things" may happen. [You have been warned.](https://thephp.cc/articles/phpunit-a-security-risk?ref=phpunit)
| ver. 1.4 |
Github
|
.
| PHP 8.1.33 | Generation time: 0 |
proxy
|
phpinfo
|
Settings