尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/dgoorden/CVE-2023-45878 | POC详情 |
| 2 | CVE-2023-45878 poc for gibbon LMS on xampp windows | https://github.com/PaulDHaes/CVE-2023-45878-POC | POC详情 |
| 3 | CVE-2023-45878 GibbonEdu Arbitrary File Write | https://github.com/killercd/CVE-2023-45878 | POC详情 |
| 4 | CVE-2023-45878 easy exploit | revers sehell | https://github.com/nrazv/CVE-2023-45878 | POC详情 |
| 5 | This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation. | https://github.com/0xyy66/CVE-2023-45878_to_RCE | POC详情 |
| 6 | GibbonEdu Arbitrary File Write to Remote Code Execution | https://github.com/davidzzo23/CVE-2023-45878 | POC详情 |
| 7 | None | https://github.com/Can0I0Ever0Enter/CVE-2023-45878 | POC详情 |
| 8 | Gibbon LMS versions 25.0.1 and earlier are vulnerable to an Arbitrary File Upload that can lead to Remote Code Execution (RCE). The issue stems from the rubrics_visualise_saveAjax.php endpoint, which, notably, does not require authentication. Because of this, unauthenticated attackers could potentially upload malicious PHP files and execute arbitrary code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45878.yaml | POC详情 |
| 9 | PoC - Arbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878) | https://github.com/ulricvbs/gibbonlms-filewrite_rce | POC详情 |
| 10 | This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation. | https://github.com/byt3loss/CVE-2023-45878_to_RCE | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论