56 lines
No EOL
1.8 KiB
JSON
56 lines
No EOL
1.8 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2023-45878",
|
|
"full_name": "killercd/CVE-2023-45878",
|
|
"html_url": "https://github.com/killercd/CVE-2023-45878",
|
|
"description": "CVE-2023-45878 GibbonEdu Arbitrary File Write",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-20T20:57:31Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-45878-POC",
|
|
"full_name": "PaulDHaes/CVE-2023-45878-POC",
|
|
"html_url": "https://github.com/PaulDHaes/CVE-2023-45878-POC",
|
|
"description": "CVE-2023-45878 poc for gibbon LMS on xampp windows",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-20T12:05:44Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-45878",
|
|
"full_name": "dgoorden/CVE-2023-45878",
|
|
"html_url": "https://github.com/dgoorden/CVE-2023-45878",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-17T11:10:46Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-45878",
|
|
"full_name": "davidzzo23/CVE-2023-45878",
|
|
"html_url": "https://github.com/davidzzo23/CVE-2023-45878",
|
|
"description": "GibbonEdu Arbitrary File Write to Remote Code Execution",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-30T13:33:12Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-45878",
|
|
"full_name": "nrazv/CVE-2023-45878",
|
|
"html_url": "https://github.com/nrazv/CVE-2023-45878",
|
|
"description": "CVE-2023-45878 easy exploit | revers sehell ",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-19T16:44:14Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-45878_to_RCE",
|
|
"full_name": "0xyy66/CVE-2023-45878_to_RCE",
|
|
"html_url": "https://github.com/0xyy66/CVE-2023-45878_to_RCE",
|
|
"description": "This script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-30T10:50:13Z"
|
|
}
|
|
] |