Current Path: > home > codekrsu > > ameliagraphics.com > wp-content > plugins > updraftplus > >
Operation : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64 Software : Apache Server IP : 162.0.232.56 | Your IP: 216.73.216.111 Domains : 1034 Domain(s) Permission : [ 0755 ]
Name | Type | Size | Last Modified | Actions |
---|---|---|---|---|
central | Directory | - | - | |
css | Directory | - | - | |
images | Directory | - | - | |
includes | Directory | - | - | |
js | Directory | - | - | |
languages | Directory | - | - | |
methods | Directory | - | - | |
templates | Directory | - | - | |
vendor | Directory | - | - | |
SECURITY.md | File | 1357 bytes | November 04 2024 13:05:34. | |
admin.php | File | 329462 bytes | May 28 2025 00:56:22. | |
backup.php | File | 234328 bytes | April 17 2025 13:45:08. | |
changelog-old.txt | File | 127258 bytes | July 06 2023 16:16:56. | |
class-updraftplus.php | File | 309875 bytes | May 28 2025 00:56:22. | |
example-decrypt.php | File | 1200 bytes | December 23 2024 23:47:28. | |
index.html | File | 4448 bytes | August 19 2021 15:58:16. | |
options.php | File | 12593 bytes | December 23 2024 23:47:28. | |
readme.txt | File | 169957 bytes | May 28 2025 00:56:22. | |
restorer.php | File | 245288 bytes | May 28 2025 00:56:22. | |
updraftplus.php | File | 16485 bytes | May 28 2025 00:56:22. |
If you believe that you have found a security issue associated with the current release of this plugin, then please report it to the email address with local part security-reports-only and the domain updraftplus.com. If receipt of the email is not acknowledged within 3 working days, then you can try again and also use the inquiry form on the plugin's website. Do not send emails on any other subject to this address. They will not be acknowledged, regardless of whether they contain pleas to do otherwise; there are inquiry forms and support forums available which are linked within the plugin and easy to find on the plugin website. Please include as much of the information listed below as you can to help us better understand and resolve the issue: * Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.) * Affected version(s) * Impact of the issue, including how an attacker might exploit the issue * Step-by-step instructions to reproduce the issue * The location of the affected code * Full paths of source file(s) related to the manifestation of the issue * Any special configuration required to reproduce the issue * Any log files that are related to this issue (if possible) * Proof-of-concept or exploit code (if possible) This information will help us triage your report more quickly. Thank you!
SILENT KILLER Tool