Leefish

File Thingie

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 20.03.2026 00:00:00
  • Zuletzt bearbeitet 01.04.2026 19:00:07

File Thinghie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "dir" parameter of the GET request to invoke arbitrary javascript code.

  • EPSS 0.03%
  • Veröffentlicht 20.03.2026 00:00:00
  • Zuletzt bearbeitet 01.04.2026 19:01:22

File Thingie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "upload file" functionality to upload a file with a crafted file name used to trigger a Javascript payload.

  • EPSS 0.07%
  • Veröffentlicht 20.03.2026 00:00:00
  • Zuletzt bearbeitet 01.04.2026 19:01:34

File Thingie 2.5.7 is vulnerable to Directory Traversal. A malicious user can leverage the "create folder from url" functionality of the application to read arbitrary files on the target system.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 11.03.2026 18:23:14
  • Zuletzt bearbeitet 13.04.2026 14:25:16

FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality ...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 18.12.2025 19:53:35
  • Zuletzt bearbeitet 31.12.2025 17:22:07

File Thingie 2.5.7 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious PHP zip archives to the web server. Attackers can create a custom PHP payload, upload and unzip it, and then execute arbitrary sys...