Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /home/corals/mautic.corals.io/.github/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/corals/mautic.corals.io/.github/CONTRIBUTING.md
## Reporting Security Vulnerabilities

If you think that you have found a security vulnerability, please report it at [https://www.mautic.org/mautic-security-team/how-to-report-a-security-issue](https://www.mautic.org/mautic-security-team/how-to-report-a-security-issue) with as much detail as possible. The Core Team will review the vulnerability and if found applicable, will assign a CVE ID and issue a fix. The vulnerability will be disclosed once the patch has been included into a release.

## Contributing to Mautic

Contribution is open and available to any member of the Mautic community. All fixes and improvements are done through Pull Requests on Github. This code is open source and publicly available.

We have five teams in the Mautic Community (Community, Education, Legal & Finance, Marketing and Product), all of whom welcome new contributors!

Please review our [Community Handbook](https://contribute.mautic.org/contributing-to-mautic) for more guidance on contributing to Mautic.

## Developer Documentation

Developer documentation is available at [https://devdocs.mautic.org](https://devdocs.mautic.org).  To make additions or corrections to the documentation, submit Issues or Pull Requests against [https://github.com/mautic/developer-documentation-new](https://github.com/mautic/developer-documentation-new).



Spamworldpro Mini