Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/dgoorden/CVE-2023-45878 | POC Details |
| 2 | CVE-2023-45878 poc for gibbon LMS on xampp windows | https://github.com/PaulDHaes/CVE-2023-45878-POC | POC Details |
| 3 | CVE-2023-45878 GibbonEdu Arbitrary File Write | https://github.com/killercd/CVE-2023-45878 | POC Details |
| 4 | CVE-2023-45878 easy exploit | revers sehell | https://github.com/nrazv/CVE-2023-45878 | POC Details |
| 5 | This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation. | https://github.com/0xyy66/CVE-2023-45878_to_RCE | POC Details |
| 6 | GibbonEdu Arbitrary File Write to Remote Code Execution | https://github.com/davidzzo23/CVE-2023-45878 | POC Details |
| 7 | None | https://github.com/Can0I0Ever0Enter/CVE-2023-45878 | POC Details |
| 8 | Gibbon LMS versions 25.0.1 and earlier are vulnerable to an Arbitrary File Upload that can lead to Remote Code Execution (RCE). The issue stems from the rubrics_visualise_saveAjax.php endpoint, which, notably, does not require authentication. Because of this, unauthenticated attackers could potentially upload malicious PHP files and execute arbitrary code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45878.yaml | POC Details |
| 9 | PoC - Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878) | https://github.com/ulricvbs/gibbonlms-filewrite_rce | POC Details |
| 10 | This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation. | https://github.com/byt3loss/CVE-2023-45878_to_RCE | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-31273 | 10.0 CRITICAL | Intel DCM software 安全漏洞 |
| CVE-2023-28737 | 8.8 HIGH | Intel NUC Software 安全漏洞 |
| CVE-2023-23583 | 8.8 HIGH | Intel Processors 安全漏洞 |
| CVE-2023-32204 | 8.8 HIGH | Intel One Boot Flash Utility 安全漏洞 |
| CVE-2023-29157 | 8.4 HIGH | Intel OFU software 安全漏洞 |
| CVE-2022-36396 | 8.2 HIGH | Intel NUC 安全漏洞 |
| CVE-2023-34431 | 8.2 HIGH | Intel Server Board 安全漏洞 |
| CVE-2022-33945 | 8.2 HIGH | Intel Server Board 安全漏洞 |
| CVE-2023-28741 | 7.9 HIGH | Intel QuickAssist Technology 安全漏洞 |
| CVE-2022-29262 | 7.9 HIGH | Intel Server Board 安全漏洞 |
| CVE-2023-28397 | 7.8 HIGH | Intel NUC 安全漏洞 |
| CVE-2023-36860 | 7.6 HIGH | Intel Unison 安全漏洞 |
| CVE-2023-32279 | 7.5 HIGH | Intel Wireless Products 安全漏洞 |
| CVE-2022-24379 | 7.5 HIGH | Intel Server Board 和 Server System BIOS firmware 安全漏洞 |
| CVE-2022-36374 | 7.5 HIGH | Intel NUC Software 安全漏洞 |
| CVE-2022-29510 | 7.5 HIGH | Intel Server Board 安全漏洞 |
| CVE-2023-22337 | 7.5 HIGH | Intel Unison 安全漏洞 |
| CVE-2023-22285 | 7.5 HIGH | Intel Unison 安全漏洞 |
| CVE-2023-32641 | 7.3 HIGH | Intel QuickAssist Technology 安全漏洞 |
| CVE-2023-24592 | 7.3 HIGH | Intel oneAPI Toolkits 安全漏洞 |
Showing top 20 of 129 CVEs. View all on vendor page → →
No comments yet