← CodeClarityLab Home
Browse by Category
+ added · updated 7d
🤖 AI Guestbook — #bypass educational data only
| |
Last 30 days
0 pings — 2026-04-16 T 1 ping — 2026-04-17 F 1 ping — 2026-04-18 S 4 pings — 2026-04-19 S 1 ping — 2026-04-20 M 1 ping — 2026-04-21 T 3 pings — 2026-04-22 W 4 pings — 2026-04-23 T 2 pings — 2026-04-24 F 3 pings — 2026-04-25 S 3 pings — 2026-04-26 S 0 pings — 2026-04-27 M 3 pings — 2026-04-28 T 0 pings — 2026-04-29 W 1 ping — 2026-04-30 T 4 pings — 2026-05-01 F 3 pings — 2026-05-02 S 7 pings — 2026-05-03 S 4 pings — 2026-05-04 M 1 ping — 2026-05-05 T 2 pings — 2026-05-06 W 3 pings — 2026-05-07 T 6 pings — 2026-05-08 F 7 pings — 2026-05-09 S 9 pings — 2026-05-10 S 1 ping — 2026-05-11 M 1 ping — 2026-05-12 T 1 ping — 2026-05-13 W 1 ping — Yesterday T 1 ping — Today F
ChatGPT 136Amazonbot 76Perplexity 51Google 21Ahrefs 18Unknown AI 16SEMrush 10Majestic 5Claude 4Bing 1Qwen 1Meta AI 1
crawler 322 crawler_json 11 pre-tracking 7
Tag total340 pings Terms pinged7 / 7 Distinct agents11
Level All Beginner Intermediate Advanced Tag: bypass
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
File Extension Bypass PHP 5.0+
Circumventing upload filters via double extensions, null bytes, or alternate MIME types to upload executable files disguised as safe ones.
CWE-434 OWASP A4:2021
2mo ago security intermediate 9.8
HTTP Parameter Pollution PHP 5.0+
Submitting duplicate HTTP parameters exploits inconsistencies in how servers and applications parse repeated keys.
CWE-235 OWASP A3:2021
2mo ago security intermediate 6.5
Null Byte Injection PHP 5.0+
Inserting a %00 null byte into a filename or string can truncate it at the C layer, bypassing extension checks.
CWE-626 OWASP A3:2021
2mo ago security intermediate 7.5
Path Normalisation Bypass PHP 5.0+
Using ../, URL encoding (%2f), or OS-specific separators to escape intended directory boundaries and access files outside an allowlisted path.
CWE-22 OWASP A1:2021
2mo ago security intermediate 7.5
SameSite Lax Bypass PHP 7.3+
SameSite=Lax still sends cookies on top-level GET navigations — attackers can exploit this with GET-based state-changing endpoints.
CWE-352 OWASP A1:2021
2mo ago security advanced 6.5
Type Juggling PHP 5.0+
PHP's loose comparison (==) can produce unexpected results — "0e123" == "0e456" is true, enabling auth bypasses.
CWE-704 OWASP A3:2021
2mo ago security intermediate 8.1
Unicode Normalisation Attack PHP 5.3+
Exploiting differences in Unicode normalisation forms to bypass input filters — two visually identical strings that differ at the byte level.
CWE-176 OWASP A3:2021
2mo ago security advanced 5.3
✓ schema.org compliant