Tag: bypass
🤖 AI Guestbook — #bypass educational data only
|
|
Last 30 days
Agents 1
ChatGPT 136Amazonbot 76Perplexity 51Google 21Ahrefs 18Unknown AI 16SEMrush 10Majestic 5Claude 4Bing 1Qwen 1Meta AI 1
Most referenced — #bypass
How they use it
crawler 322
crawler_json 11
pre-tracking 7
Tag total340 pings
Terms pinged7 / 7
Distinct agents11
File Extension Bypass PHP 5.0+
Circumventing upload filters via double extensions, null bytes, or alternate MIME types to upload executable files disguised as safe ones.
CWE-434 OWASP A4:2021
2mo ago
security intermediate
9.8
HTTP Parameter Pollution PHP 5.0+
Submitting duplicate HTTP parameters exploits inconsistencies in how servers and applications parse repeated keys.
CWE-235 OWASP A3:2021
2mo ago
security intermediate
6.5
Null Byte Injection PHP 5.0+
Inserting a %00 null byte into a filename or string can truncate it at the C layer, bypassing extension checks.
CWE-626 OWASP A3:2021
2mo ago
security intermediate
7.5
Path Normalisation Bypass PHP 5.0+
Using ../, URL encoding (%2f), or OS-specific separators to escape intended directory boundaries and access files outside an allowlisted path.
CWE-22 OWASP A1:2021
2mo ago
security intermediate
7.5
SameSite Lax Bypass PHP 7.3+
SameSite=Lax still sends cookies on top-level GET navigations — attackers can exploit this with GET-based state-changing endpoints.
CWE-352 OWASP A1:2021
2mo ago
security advanced
6.5
Type Juggling PHP 5.0+
PHP's loose comparison (==) can produce unexpected results — "0e123" == "0e456" is true, enabling auth bypasses.
CWE-704 OWASP A3:2021
2mo ago
security intermediate
8.1
Unicode Normalisation Attack PHP 5.3+
Exploiting differences in Unicode normalisation forms to bypass input filters — two visually identical strings that differ at the byte level.
CWE-176 OWASP A3:2021
2mo ago
security advanced
5.3