{"vulnerability": "CVE-2023-4587", "sightings": [{"uuid": "3babddc6-5773-4c10-80b6-de4b7c7af2dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3locaehl3we2k", "content": "", "creation_timestamp": "2025-05-03T21:02:16.460368Z"}, {"uuid": "e91afd60-521c-4365-adda-f796928463bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lppir3qqd22w", "content": "", "creation_timestamp": "2025-05-21T21:02:20.078137Z"}, {"uuid": "37fc1f57-214d-4b18-a762-ac6c64c3148c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "a7f6e240-7026-479e-b92b-94b4a98e6d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "6f81d0d8-21b2-4895-9547-523d26e07014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-45878.yaml", "content": "", "creation_timestamp": "2025-04-29T00:46:35.000000Z"}, {"uuid": "61faadb3-136c-415f-a01e-985638bd7fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "21377f03-8138-4949-8bae-448070964634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "7a76cad2-3d02-48a5-b08c-bdf7d778a0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-17)", "content": "", "creation_timestamp": "2026-03-17T00:00:00.000000Z"}, {"uuid": "dd5b51d8-94f9-4dc0-8041-8bb9a23a08d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "00804ac0-30e9-404e-82ca-09e04e56f074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45874", "type": "seen", "source": "Telegram/NK-8-HLZ_EUhi-U4immzSMIaUyAvtlAuwVOkP3rnbxO7HR1v", "content": "", "creation_timestamp": "2025-02-14T21:08:31.000000Z"}, {"uuid": "f15c9a78-afb3-451c-abb6-ad56425a817f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-01)", "content": "", "creation_timestamp": "2026-04-01T00:00:00.000000Z"}, {"uuid": "f1e6414e-4671-4f8b-ad4b-cfeab45c56db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-19)", "content": "", "creation_timestamp": "2026-04-19T00:00:00.000000Z"}, {"uuid": "c68a3860-f3ba-4e28-816d-1dbbd74012d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/746", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45878\n\ud83d\udd39 Description: GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).\n\ud83d\udccf Published: 2023-11-14T00:00:00\n\ud83d\udccf Modified: 2025-01-08T16:45:47.399Z\n\ud83d\udd17 References:\n1. https://herolab.usd.de/security-advisories/usd-2023-0025/", "creation_timestamp": "2025-01-08T17:16:45.000000Z"}, {"uuid": "c3fdc7ba-364e-437c-babd-3c13d9a12857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45874", "type": "seen", "source": "Telegram/rlbnNF-jij67DefhaWE2LbN5fl2EUUZ-rkEH-Fpnh2-vyvll", "content": "", "creation_timestamp": "2025-02-14T17:39:47.000000Z"}, {"uuid": "d19a8098-e736-4b25-a028-d39e90c216ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45874", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45874\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Couchbase Server through 7.2.2. A data reader may cause a denial of service (outage of reader threads).\n\ud83d\udccf Published: 2024-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T20:50:29.029Z\n\ud83d\udd17 References:\n1. https://forums.couchbase.com/tags/security\n2. https://docs.couchbase.com/server/current/release-notes/relnotes.html\n3. https://www.couchbase.com/alerts/", "creation_timestamp": "2025-03-26T21:26:01.000000Z"}, {"uuid": "b5dc2336-de8a-4b2b-a63b-3ffdfc8421e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45872", "type": "seen", "source": "https://t.me/cvedetector/7431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-45872 - Qt QML Image Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2023-45872 \nPublished : Oct. 9, 2024, 6:15 a.m. | 32\u00a0minutes ago \nDescription : An issue was discovered in Qt before 6.2.11 and 6.3.x through 6.6.x before 6.6.1. When a QML image refers to an image whose content is not known yet, there is an assumption that it is an SVG document, leading to a denial of service (application crash) if it is not actually an SVG document. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T08:57:22.000000Z"}, {"uuid": "0ea3b888-1689-44dc-9342-f15c14d1a387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/27560", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aThis script chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.\nURL\uff1ahttps://github.com/0xyy66/CVE-2023-45878_to_RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-03-30T21:38:00.000000Z"}, {"uuid": "7c53265b-de1b-4118-bfdf-215ce29fcbbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/32313", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aArbitrary File Write in Gibbon LMS for RCE (CVE-2023-45878)\nURL\uff1ahttps://github.com/ulricvbs/gibbonlms-filewrite_rce\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-04-16T20:55:29.000000Z"}, {"uuid": "92f52099-42a9-4d2f-9257-e82153b65ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45871", "type": "seen", "source": "https://t.me/cibsecurity/72289", "content": "\u203c CVE-2023-45871 \u203c\n\nAn issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-15T07:30:26.000000Z"}, {"uuid": "7419bbdc-6b1a-4509-91ca-470a4fe9a2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "Telegram/eVE5YmoRFUZV8c7TTGPUWrAfKBs48EKz-_YLWjtS9xYVJuE", "content": "", "creation_timestamp": "2025-03-30T23:00:06.000000Z"}, {"uuid": "2fd36018-1dde-4124-9e49-116ff794592a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "Telegram/Y6MqGtLM5ccvEmlRJO9-JfH9jytI_xcSqG1WwKJD5suL4M0", "content": "", "creation_timestamp": "2025-04-17T05:00:06.000000Z"}, {"uuid": "de5d2738-28bf-4665-baec-8894d03edf4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "Telegram/ThXju2ZMT_612yASJRrFQJIKnYK5F6XY7q6en3PVZ2DGB64", "content": "", "creation_timestamp": "2025-03-21T04:00:08.000000Z"}, {"uuid": "3879c132-72ce-4961-996f-5bf3fedeab39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45878", "type": "published-proof-of-concept", "source": "Telegram/gMA-tjO3u7r6v0DXDtEtTd2G2qr0DluN8PNDCBpeT15Ynng", "content": "", "creation_timestamp": "2025-03-20T16:00:08.000000Z"}, {"uuid": "1e429f7c-e185-4a8e-ba2a-7b59341fd738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45873", "type": "seen", "source": "https://t.me/ctinow/195981", "content": "https://ift.tt/8WihQbn\nCVE-2023-45873", "creation_timestamp": "2024-02-28T23:27:12.000000Z"}, {"uuid": "9d725964-fe2b-4ebb-a723-7cdae99d7fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45873", "type": "seen", "source": "https://t.me/ctinow/195966", "content": "https://ift.tt/8WihQbn\nCVE-2023-45873", "creation_timestamp": "2024-02-28T23:26:56.000000Z"}, {"uuid": "43138e0b-544b-4a76-91b6-68428401b608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4587", "type": "seen", "source": "https://t.me/cibsecurity/69782", "content": "\u203c CVE-2023-4587 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED ** An IDOR vulnerability has been found in ZKTeco ZEM800 product affecting version 6.60. This vulnerability allows a local attacker to obtain registered user backup files or device configuration files over a local network or through a VPN server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T16:16:24.000000Z"}]}