{"vulnerability": "CVE-2023-4016", "sightings": [{"uuid": "1341d3c4-24ae-433d-b2a6-49be3d7796d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40166", "type": "seen", "source": "https://t.me/arpsyndicate/2927", "content": "#ExploitObserverAlert\n\nCVE-2023-40166\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-40166. Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.\n\nFIRST-EPSS: 0.000520000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2024-01-19T12:45:13.000000Z"}, {"uuid": "5dc5d504-01ef-4bee-8376-2bde0820d844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40160", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8545", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40160\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Directory traversal vulnerability exists in Mailing List Search CGI (pmmls.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a remote attacker may obtain arbitrary files on the server.\n\ud83d\udccf Published: 2024-03-18T00:32:53.212Z\n\ud83d\udccf Modified: 2025-03-24T21:06:34.497Z\n\ud83d\udd17 References:\n1. https://akisoftware.com/Vulnerability202301.html\n2. https://jvn.jp/en/jp/JVN92720882/", "creation_timestamp": "2025-03-24T21:23:23.000000Z"}, {"uuid": "d4a1be4d-b620-4ae0-a9ca-110e2dac80e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40167", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lkbyl6ph5i2s", "content": "", "creation_timestamp": "2025-03-13T21:02:06.487702Z"}, {"uuid": "ebc1c33f-4aac-4610-a8a1-35bfcb89e3ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40164", "type": "seen", "source": "https://t.me/arpsyndicate/2739", "content": "#ExploitObserverAlert\n\nCVE-2023-40164\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-40164. Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `nsCodingStateMachine::NextStater`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.\n\nFIRST-EPSS: 0.000520000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2024-01-09T09:16:29.000000Z"}, {"uuid": "5773ba7c-0131-47e5-ab6e-f7d7010aa6a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40164", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3179", "content": "Hackers Factory \n\nPeer-to-peer bidirectional connection based on Network.framework\n\nhttps://github.com/saagarjha/AppleConnect\n\nAnalyse your malware to surgically obfuscate it\n\nhttps://github.com/dobin/avred\n\nBurp Suite Sharpener\nThis extension should add a number of UI and functional features to Burp Suite to make working with it a bit easier. The latest version of this extension is only compatible with Burp Suite version 2023.10-22956 and above.\n\nhttps://github.com/irsdl/BurpSuiteSharpenerEx/\n\nvulnlab.com reaper writeup\n\nhttps://github.com/macrl2000/reaper-wu\n\nRun Capture the Flags and Security Trainings with OWASP WrongSecrets\n\nhttps://github.com/OWASP/wrongsecrets-ctf-party\n\nMachine Learning for Cyber Security\n\nhttps://github.com/jivoi/awesome-ml-for-cybersecurity\n\nA collection of tools for security research on Starlink's User Terminal\n\nhttps://github.com/quarkslab/starlink-tools\n\nexamples of using radius2 to solve reversing challenges\n\nhttps://github.com/aemmitt-ns/radius2-examples\n\nGHSL-2023-112, GHSL-2023-102, GHSL-2023-103, GHSL-2023-092: Buffer Overflows in Notepad++ - CVE-2023-40031, CVE-2023-40036, CVE-2023-40164, CVE-2023-40166\n\nhttps://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/\n\nRunAsWinTcb\n\nhttps://github.com/tastypepperoni/RunAsWinTcb\n\n#infosec #cybersecurity #pentesting #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-05T07:29:58.000000Z"}, {"uuid": "bd02871b-ce95-4451-bb6d-03720e35d0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4016", "type": "seen", "source": "https://t.me/arpsyndicate/254", "content": "#ExploitObserverAlert\n\nCVE-2023-4016\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2023-4016. Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-11-17T10:13:22.000000Z"}, {"uuid": "e6da93dc-ef5d-4192-92a2-3741de9366fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4016", "type": "seen", "source": "https://t.me/arpsyndicate/1592", "content": "#ExploitObserverAlert\n\nCVE-2023-4016\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-4016. Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-10T01:21:42.000000Z"}, {"uuid": "7466900d-4fe8-48e0-bf70-edd6ebea4cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40166", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3179", "content": "Hackers Factory \n\nPeer-to-peer bidirectional connection based on Network.framework\n\nhttps://github.com/saagarjha/AppleConnect\n\nAnalyse your malware to surgically obfuscate it\n\nhttps://github.com/dobin/avred\n\nBurp Suite Sharpener\nThis extension should add a number of UI and functional features to Burp Suite to make working with it a bit easier. The latest version of this extension is only compatible with Burp Suite version 2023.10-22956 and above.\n\nhttps://github.com/irsdl/BurpSuiteSharpenerEx/\n\nvulnlab.com reaper writeup\n\nhttps://github.com/macrl2000/reaper-wu\n\nRun Capture the Flags and Security Trainings with OWASP WrongSecrets\n\nhttps://github.com/OWASP/wrongsecrets-ctf-party\n\nMachine Learning for Cyber Security\n\nhttps://github.com/jivoi/awesome-ml-for-cybersecurity\n\nA collection of tools for security research on Starlink's User Terminal\n\nhttps://github.com/quarkslab/starlink-tools\n\nexamples of using radius2 to solve reversing challenges\n\nhttps://github.com/aemmitt-ns/radius2-examples\n\nGHSL-2023-112, GHSL-2023-102, GHSL-2023-103, GHSL-2023-092: Buffer Overflows in Notepad++ - CVE-2023-40031, CVE-2023-40036, CVE-2023-40164, CVE-2023-40166\n\nhttps://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/\n\nRunAsWinTcb\n\nhttps://github.com/tastypepperoni/RunAsWinTcb\n\n#infosec #cybersecurity #pentesting #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-05T07:29:58.000000Z"}, {"uuid": "78fd7723-58ef-4253-b139-47199a4cead2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40161", "type": "seen", "source": "https://t.me/ctinow/184820", "content": "https://ift.tt/4r5aDTO\nCVE-2023-40161", "creation_timestamp": "2024-02-14T17:03:15.000000Z"}, {"uuid": "3ee59fc2-24da-4078-a964-235bf1846c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40160", "type": "seen", "source": "https://t.me/ctinow/210118", "content": "https://ift.tt/OD32lYr\nCVE-2023-40160", "creation_timestamp": "2024-03-18T02:26:48.000000Z"}, {"uuid": "a77bc4a1-1e6c-4eda-9c85-949a17e44c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40160", "type": "seen", "source": "https://t.me/ctinow/210111", "content": "https://ift.tt/OD32lYr\nCVE-2023-40160", "creation_timestamp": "2024-03-18T02:21:50.000000Z"}, {"uuid": "8ceb7b17-abb3-4240-bf77-34f1ecb526a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40167", "type": "seen", "source": "https://t.me/ctinow/181107", "content": "https://ift.tt/UlHfdkO\nCVE-2023-40167 | Oracle Communications Cloud Native Core Network Data Analytics Function Configuration length parameter", "creation_timestamp": "2024-02-08T02:26:15.000000Z"}, {"uuid": "7028fd78-9d92-4590-8e5c-e8901cd52a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40161", "type": "seen", "source": "https://t.me/ctinow/201401", "content": "https://ift.tt/2UrqhRD\nCVE-2023-40161 | Intel Unite Client Software prior 4.2.35041 access control (intel-sa-00981)", "creation_timestamp": "2024-03-06T14:41:30.000000Z"}, {"uuid": "e1fdb58e-f791-46a4-b5b8-f71dfe977fae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40168", "type": "seen", "source": "https://t.me/cibsecurity/68802", "content": "\u203c CVE-2023-40168 \u203c\n\nTurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T00:37:53.000000Z"}, {"uuid": "7c2d3b7a-d0b7-46f5-b60e-7a37b616f3b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40164", "type": "seen", "source": "https://t.me/cibsecurity/69212", "content": "\u203c CVE-2023-40164 \u203c\n\nNotepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `nsCodingStateMachine::NextStater`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T00:14:24.000000Z"}, {"uuid": "f2027524-b596-42d6-8103-314a00afbfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40167", "type": "seen", "source": "https://t.me/cibsecurity/70624", "content": "\u203c CVE-2023-40167 \u203c\n\nJetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-16T00:26:02.000000Z"}, {"uuid": "61b1b849-ff1f-4423-9e94-ad8180ffb864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40165", "type": "seen", "source": "https://t.me/cibsecurity/68776", "content": "\u203c CVE-2023-40165 \u203c\n\nrubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching `/-\\d/`, permanently replacing the legitimate upload in the canonical gem storage bucket, and triggering an immediate CDN purge so that the malicious gem would be served immediately. The maintainers have checked all gems matching the `/-\\d/` pattern and can confirm that no unexpected `.gem`s were found. As a result, we believe this vulnerability was _not_ exploited. The easiest way to ensure that a user's applications were not exploited by this vulnerability is to check that all of your downloaded .gems have a checksum that matches the checksum recorded in the RubyGems.org database. RubyGems contributor Maciej Mensfeld wrote a tool to automatically check that all downloaded .gem files match the checksums recorded in the RubyGems.org database. You can use it by running: `bundle add bundler-integrity` followed by `bundle exec bundler-integrity`. Neither this tool nor anything else can prove you were not exploited, but the can assist your investigation by quickly comparing RubyGems API-provided checksums with the checksums of files on your disk. The issue has been patched with improved input validation and the changes are live. No action is required on the part of the user. Users are advised to validate their local gems.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-17T22:38:05.000000Z"}, {"uuid": "c3f04b9f-90dc-4712-9f4a-afef9254a225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4016", "type": "seen", "source": "https://t.me/cibsecurity/67567", "content": "\u203c CVE-2023-4016 \u203c\n\nUnder some circumstances, this weakness allows a user who has access to run the \u00e2\u20ac\u0153ps\u00e2\u20ac\ufffd utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T12:39:06.000000Z"}]}