{"vulnerability": "CVE-2023-40031", "sightings": [{"uuid": "bd182277-3f6e-4cc9-8577-60f7113ccbbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40031", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5104", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1anotepad++\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1eCVE-2023-40031 \u5206\u6790\u4e0e\u590d\u73b0\nURL\uff1ahttps://github.com/webraybtl/CVE-2023-40031\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-09T01:18:57.000000Z"}, {"uuid": "2e9b7b1b-92b8-46bb-8fad-eeea11d9fad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40031", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11541", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2023-40031: Notepad++ heap buffer overflow vulnerability CVE-2023-40031 analysis and reproduction.\n\nhttps://github.com/webraybtl/CVE-2023-40031", "creation_timestamp": "2023-09-10T07:16:49.000000Z"}, {"uuid": "c8473c0d-0c4c-42c9-9958-cd8549ead613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40031", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3179", "content": "Hackers Factory \n\nPeer-to-peer bidirectional connection based on Network.framework\n\nhttps://github.com/saagarjha/AppleConnect\n\nAnalyse your malware to surgically obfuscate it\n\nhttps://github.com/dobin/avred\n\nBurp Suite Sharpener\nThis extension should add a number of UI and functional features to Burp Suite to make working with it a bit easier. The latest version of this extension is only compatible with Burp Suite version 2023.10-22956 and above.\n\nhttps://github.com/irsdl/BurpSuiteSharpenerEx/\n\nvulnlab.com reaper writeup\n\nhttps://github.com/macrl2000/reaper-wu\n\nRun Capture the Flags and Security Trainings with OWASP WrongSecrets\n\nhttps://github.com/OWASP/wrongsecrets-ctf-party\n\nMachine Learning for Cyber Security\n\nhttps://github.com/jivoi/awesome-ml-for-cybersecurity\n\nA collection of tools for security research on Starlink's User Terminal\n\nhttps://github.com/quarkslab/starlink-tools\n\nexamples of using radius2 to solve reversing challenges\n\nhttps://github.com/aemmitt-ns/radius2-examples\n\nGHSL-2023-112, GHSL-2023-102, GHSL-2023-103, GHSL-2023-092: Buffer Overflows in Notepad++ - CVE-2023-40031, CVE-2023-40036, CVE-2023-40164, CVE-2023-40166\n\nhttps://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/\n\nRunAsWinTcb\n\nhttps://github.com/tastypepperoni/RunAsWinTcb\n\n#infosec #cybersecurity #pentesting #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-05T07:29:58.000000Z"}, {"uuid": "b4cc0baa-a126-49f3-bf15-31c6c0ca74e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40031", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3187", "content": "Hackers Factory \n\nA fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests\n\nhttps://github.com/projectdiscovery/naabu\n\nA collection of phishing samples for researchers and detection developers.\n\nhttps://github.com/rf-peixoto/phishing_pot\n\nPassive subdomain continous monitoring tool.\n\nhttps://github.com/e1abrador/sub.Monitor\n\nSecurity scanner for your Terraform code\n\nhttps://github.com/aquasecurity/tfsec\n\nDetect and remediate misconfigurations and security risks across all your GitHub and GitLab assets\n\nhttps://github.com/Legit-Labs/legitify\n\nStreamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.\n\nhttps://github.com/thecyberneh/scriptkiddi3\n\nUseful resources for SOC Analyst and SOC Analyst candidates.\n\nhttps://github.com/LetsDefend/awesome-soc-analyst\n\nXML-RPC Vulnerability Checker and Directory Fuzzer\n\nhttps://github.com/MINAD0/XML-RPC-Check\n\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943\n\nAn exploit for OpenTSDB &lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nNotepad++ heap buffer overflow vulnerability CVE-2023-40031 analysis and reproduction\n\nhttps://github.com/webraybtl/CVE-2023-40031\n\nPMP-Decrypter. This is a tool to decrypt the encrypted password strings in \"Patch My PC\"\n\nhttps://github.com/LuemmelSec/PMP-Decrypter\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-10T12:01:22.000000Z"}]}