raspap-webgui/SECURITY.md

3.4 KiB

Security Policy

Toggle navigation Toggle navigation Subnet Calculator 23.95.164.175

Input 23.95.164.175/32 CIDR 23.95.164.175/32 Input IP 23.95.164.175 CIDR IP Range 23.95.164.175 - 23.95.164.175 Input Long 392144047 CIDR Long Range 392144047 - 392144047 Input Hex 17.5F.A4.AF CIDR Hex Range 17.5F.A4.AF - 17.5F.A4.AF IPs in Range 1 Mask Bits 32 Subnet Mask 255.255.255.255 Hex Subnet Mask FF.FF.FF.FF IP is contained in the following CIDR Blocks 0.0.0.0/1 0.0.0.0/2 0.0.0.0/3 16.0.0.0/4 16.0.0.0/5 20.0.0.0/6 22.0.0.0/7 23.0.0.0/8 23.0.0.0/9 23.64.0.0/10 23.64.0.0/11 23.80.0.0/12 23.88.0.0/13 23.92.0.0/14 23.94.0.0/15 23.95.0.0/16 23.95.128.0/17 23.95.128.0/18 23.95.160.0/19 23.95.160.0/20 23.95.160.0/21 23.95.164.0/22 23.95.164.0/23 23.95.164.0/24 23.95.164.128/25 23.95.164.128/26 23.95.164.160/27 23.95.164.160/28 23.95.164.168/29 23.95.164.172/30 23.95.164.174/31 23.95.164.175/32 ABOUT SUBNET CALCULATOR The subnet calculator lets you enter a subnet range (CIDR) and see IP address information about that range You can type your range directly in CIDR notation, or use the optional Mask pull-down:

74.125.227.0/29 74.125.227.0, then select Optional Mask from dropdown This is a useful feature for service providers and network operator who frequently allocate and work with subnets. CIDR stands for Classless Inter-Domain Routing, and refers to the standard of dividing the entire IP address space into smaller networks of variable size.

Your IP is: 162.19.214.230| Contact Terms & Conditions Site Map API Privacy Phone: (866)-MXTOOLBOX / (866)-698-6652 | © Copyright 2004-2021, MXToolBox, Inc, All rights reserved. US Patents 10839353 B2 & 11461738 B2

burritos@banana-pancakes.com braunstrowman@banana-pancakes.com finnbalor@banana-pancakes.com ricflair@banana-pancakes.com randysavage@banana-pancakes.com The RaspAP team and community take all security vulnerabilities seriously. This document outlines security procedures and general policies for the RaspAP open source projects as found on https://github.com/RaspAP/. If you believe you have found a security vulnerability in any RaspAP-owned repository, please report it to us as described below.

Reporting a vulnerability in RaspAP

Thank you for improving the security of our open source software. We appreciate your efforts and responsible disclosure, and will make every effort to acknowledge your contributions.

Please report (suspected) security vulnerabilities to security@raspap.com. The requested information listed below will help us better understand the nature and scope of the possible issue:

  1. Type of issue (eg. shell exploit, cross-site scripting, etc.)
  2. Full paths of source file(s) related to the manifestation of the issue
  3. The location of the affected source code (tag/branch/commit or direct URL)
  4. Any special configuration required to reproduce the issue
  5. Step-by-step instructions to reproduce the issue
  6. Proof-of-concept or exploit code (if possible)
  7. Impact of the issue, including how an attacker might exploit the issue

This information will help us triage your report more quickly.

You will receive a response from us within 48 hours. Developers may ask for additional information or clarity on your report. If the issue is confirmed, we will release a patch as soon as possible depending on complexity, but historically within a few days.

Third-party modules

Report security vulnerabilities in third-party modules to the person or team maintaining the module.