exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36757
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks functional exploit code.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36755
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks executable code or detailed technical steps.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36754
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks functional exploit code.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36753
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL example but lacks actual exploit code or technical details for execution.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application · Ability to craft malicious URLs
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36752
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5, but does not include functional exploit code. It references a URL parameter manipulation for exploitation.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36732
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks functional exploit code.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36731
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36730
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36729
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36728
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks functional exploit code.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36727
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5, but does not include functional exploit code. It references a URL parameter manipulation for potential exploitation.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application · Ability to manipulate URL parameters
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36726
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36725
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target URL · BASE software installed and running
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36711
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36710
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details for execution.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36709
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. The exploit involves manipulating the 'BASE_path' parameter in 'base_main.php' to include arbitrary files, potentially leading to unauthorized access or code execution.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application · Knowledge of the vulnerable parameter
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36708
The exploit describes a remote file inclusion vulnerability in BASE 1.4.5 via the 'BASE_path' parameter in 'base_logout.php'. It allows an attacker to include arbitrary files, potentially leading to unauthorized access or code execution.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the vulnerable BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36707
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5, where an attacker can exploit the 'BASE_path' parameter in 'base_local_rules.php' to include arbitrary files. The exploit URL is provided as a proof-of-concept.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target URL
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36706
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. The advisory includes a reference to an exploit URL but lacks actual exploit code.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36705
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. The advisory includes a reference to a vulnerable function and a sample exploit URL but lacks executable exploit code.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the vulnerable BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36704
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. The exploit involves manipulating the 'BASE_path' parameter in 'base_graph_display.php' to include arbitrary files.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36703
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5, where an attacker can exploit the 'BASE_path' parameter in 'base_graph_common.php' to include arbitrary files. No actual exploit code is present, only a description and an example URL.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target URL · BASE 1.4.5 installed on the target
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36702
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5, but does not include functional exploit code. It references a vulnerable parameter in `base_db_setup.php` without demonstrating exploitation.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the vulnerable BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36724
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL example but lacks actual exploit code or technical details.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36723
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL example but lacks actual exploit code or technical details for execution.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36721
The provided text describes a security-bypass and remote file-include vulnerability in BASE 1.4.5. It includes a generic exploit URL but lacks actual exploit code or technical details for execution.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36720
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36719
The provided text describes a vulnerability in BASE (Basic Analysis and Security Engine) version 1.4.5, which includes a security bypass and remote file inclusion vulnerabilities. The exploit URL demonstrates a path traversal attack via the 'BASE_path' parameter.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the vulnerable BASE web interface
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36722
The exploit describes a security-bypass and remote file-include vulnerability in BASE 1.4.5. It provides a URL example demonstrating how an attacker can manipulate the 'user_session_path' parameter to include arbitrary files.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36718
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36717
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36716
The provided text describes a vulnerability in BASE (Basic Analysis and Security Engine) version 1.4.5, which includes a security bypass and remote file inclusion vulnerabilities. The exploit URL demonstrates how an attacker could manipulate the 'BASE_path' parameter to include arbitrary files.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36715
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks functional exploit code.
Classification
Writeup 80%
Attack Type
Info Leak | Auth Bypass
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36714
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details for execution.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE installation
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36713
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details for execution.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36712
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target web application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36759
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL example but lacks actual exploit code or technical details.
Classification
Writeup 80%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE application
exploitdb
WRITEUP
VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/36758
The provided text describes a security advisory for BASE (Basic Analysis and Security Engine) version 1.4.5, highlighting a security-bypass vulnerability and multiple remote file-include vulnerabilities. It includes a generic exploit URL but lacks actual exploit code or technical details for execution.
Classification
Writeup 90%
Target:
BASE 1.4.5
No auth needed
Prerequisites:
Access to the target BASE installation