[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.139.70.69: ~ $
{"type":"info","name":"no-virus","data":{"file":"htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt","description":"No virus detected in upload “htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt”."}}
{"type":"debug","data":{"database":"hmhc3928_htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt","file":"htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt","description":"The system identified the database name for the backup file “htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt” to be “hmhc3928_htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt”."},"name":"database_name"}
{"type":"error","data":{"file":"htaccess_Backup_for_ahsmore.mhcollab.ca_staging.txt","description":"This database name has too many wildcard-sensitive characters (“\\”, “_”, and “%”). The system stores each of these as two characters internally, up to a limit of 64 characters. This name would take up 65 characters of internal storage, which is 1 too many."},"name":"exception"}
{"type":"close"}

Filemanager

Name Type Size Permission Actions
2023-09-05T14:23:38Z.1.log File 75.45 KB 0644
2023-09-07T18:23:57Z.1.log File 75.38 KB 0644
2024-11-12T19:13:38Z.1.log File 1008 B 0644