![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /home/corals/mautic.corals.io/.github/ |
## Reporting Security Vulnerabilities If you think that you have found a security vulnerability, please report it at [https://www.mautic.org/mautic-security-team/how-to-report-a-security-issue](https://www.mautic.org/mautic-security-team/how-to-report-a-security-issue) with as much detail as possible. The Core Team will review the vulnerability and if found applicable, will assign a CVE ID and issue a fix. The vulnerability will be disclosed once the patch has been included into a release. ## Contributing to Mautic Contribution is open and available to any member of the Mautic community. All fixes and improvements are done through Pull Requests on Github. This code is open source and publicly available. We have five teams in the Mautic Community (Community, Education, Legal & Finance, Marketing and Product), all of whom welcome new contributors! Please review our [Community Handbook](https://contribute.mautic.org/contributing-to-mautic) for more guidance on contributing to Mautic. ## Developer Documentation Developer documentation is available at [https://devdocs.mautic.org](https://devdocs.mautic.org). To make additions or corrections to the documentation, submit Issues or Pull Requests against [https://github.com/mautic/developer-documentation-new](https://github.com/mautic/developer-documentation-new).