{"vulnerability": "CVE-2023-40036", "sightings": [{"uuid": "75561034-a446-48a0-9fd8-45a2fc1417ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40036", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3179", "content": "Hackers Factory \n\nPeer-to-peer bidirectional connection based on Network.framework\n\nhttps://github.com/saagarjha/AppleConnect\n\nAnalyse your malware to surgically obfuscate it\n\nhttps://github.com/dobin/avred\n\nBurp Suite Sharpener\nThis extension should add a number of UI and functional features to Burp Suite to make working with it a bit easier. The latest version of this extension is only compatible with Burp Suite version 2023.10-22956 and above.\n\nhttps://github.com/irsdl/BurpSuiteSharpenerEx/\n\nvulnlab.com reaper writeup\n\nhttps://github.com/macrl2000/reaper-wu\n\nRun Capture the Flags and Security Trainings with OWASP WrongSecrets\n\nhttps://github.com/OWASP/wrongsecrets-ctf-party\n\nMachine Learning for Cyber Security\n\nhttps://github.com/jivoi/awesome-ml-for-cybersecurity\n\nA collection of tools for security research on Starlink's User Terminal\n\nhttps://github.com/quarkslab/starlink-tools\n\nexamples of using radius2 to solve reversing challenges\n\nhttps://github.com/aemmitt-ns/radius2-examples\n\nGHSL-2023-112, GHSL-2023-102, GHSL-2023-103, GHSL-2023-092: Buffer Overflows in Notepad++ - CVE-2023-40031, CVE-2023-40036, CVE-2023-40164, CVE-2023-40166\n\nhttps://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/\n\nRunAsWinTcb\n\nhttps://github.com/tastypepperoni/RunAsWinTcb\n\n#infosec #cybersecurity #pentesting #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-05T07:29:58.000000Z"}, {"uuid": "62b7f936-9c86-40f8-8a3f-85e04c65e80a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40036", "type": "seen", "source": "https://t.me/cibsecurity/69218", "content": "\u203c CVE-2023-40036 \u203c\n\nNotepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `CharDistributionAnalysis::HandleOneChar`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T00:14:36.000000Z"}]}