diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json index 353bdde855..33da7dca70 100644 --- a/2011/CVE-2011-2523.json +++ b/2011/CVE-2011-2523.json @@ -103,10 +103,10 @@ "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution", "fork": false, "created_at": "2021-11-07T06:20:27Z", - "updated_at": "2023-06-21T10:11:56Z", + "updated_at": "2023-09-02T01:40:15Z", "pushed_at": "2023-01-08T17:46:12Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -122,7 +122,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 14c46fff1a..14a7bf63d0 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,10 +13,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2023-08-14T17:55:32Z", + "updated_at": "2023-09-02T03:15:44Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2297, - "watchers_count": 2297, + "stargazers_count": 2298, + "watchers_count": 2298, "has_discussions": false, "forks_count": 489, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 489, - "watchers": 2297, + "watchers": 2298, "score": 0, "subscribers_count": 118 }, diff --git a/2018/CVE-2018-2879.json b/2018/CVE-2018-2879.json index b2645f9560..09295d2455 100644 --- a/2018/CVE-2018-2879.json +++ b/2018/CVE-2018-2879.json @@ -78,13 +78,13 @@ "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, - "forks_count": 10, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 9, "watchers": 23, "score": 0, "subscribers_count": 3 diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 1ab06c315f..ddcfbbd70c 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,10 +13,10 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2023-08-26T08:44:25Z", + "updated_at": "2023-09-02T00:40:40Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 309, - "watchers_count": 309, + "stargazers_count": 310, + "watchers_count": 310, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 117, - "watchers": 309, + "watchers": 310, "score": 0, "subscribers_count": 8 }, diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index cf969dbcaf..7668d0a9e7 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -13,19 +13,19 @@ "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", - "updated_at": "2023-08-21T08:38:38Z", + "updated_at": "2023-09-02T05:07:15Z", "pushed_at": "2020-02-20T11:03:18Z", - "stargazers_count": 196, - "watchers_count": 196, + "stargazers_count": 197, + "watchers_count": 197, "has_discussions": false, - "forks_count": 54, + "forks_count": 55, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 54, - "watchers": 196, + "forks": 55, + "watchers": 197, "score": 0, "subscribers_count": 8 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 5d6b8c2c64..74adf9b11f 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -43,10 +43,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2023-09-01T00:33:23Z", + "updated_at": "2023-09-02T00:35:28Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1637, - "watchers_count": 1637, + "stargazers_count": 1638, + "watchers_count": 1638, "has_discussions": false, "forks_count": 361, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 361, - "watchers": 1637, + "watchers": 1638, "score": 0, "subscribers_count": 90 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 95c42b78c9..e60c086414 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3643,7 +3643,7 @@ "description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes", "fork": false, "created_at": "2021-12-13T03:15:42Z", - "updated_at": "2022-09-12T02:34:11Z", + "updated_at": "2023-09-02T02:29:03Z", "pushed_at": "2021-12-14T23:03:03Z", "stargazers_count": 5, "watchers_count": 5, diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index 50750a8259..ec4c8e5604 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -13,10 +13,10 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2023-08-28T01:05:02Z", + "updated_at": "2023-09-02T00:57:51Z", "pushed_at": "2022-03-26T05:52:15Z", - "stargazers_count": 445, - "watchers_count": 445, + "stargazers_count": 446, + "watchers_count": 446, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 445, + "watchers": 446, "score": 0, "subscribers_count": 20 } diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index 4d62934d5c..e148e53db4 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -43,10 +43,10 @@ "description": "LPE PoC of a user-after-free vulnerability in the Linux netfilter subsystem.", "fork": false, "created_at": "2023-01-27T14:44:39Z", - "updated_at": "2023-06-11T20:23:24Z", + "updated_at": "2023-09-02T02:05:37Z", "pushed_at": "2023-02-04T16:27:22Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index ad976b4aa6..cf3bafbca6 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -13,10 +13,10 @@ "description": "Juju: GameOver(lay) CVE-2023-2640 and CVE-2023-32629 patcher", "fork": false, "created_at": "2023-08-04T18:28:52Z", - "updated_at": "2023-08-24T18:23:13Z", + "updated_at": "2023-09-02T02:12:39Z", "pushed_at": "2023-08-24T18:24:29Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-26469.json b/2023/CVE-2023-26469.json index 6b866f9ba1..357a9215c7 100644 --- a/2023/CVE-2023-26469.json +++ b/2023/CVE-2023-26469.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-26818.json b/2023/CVE-2023-26818.json index 785f3c2dc5..d48246251b 100644 --- a/2023/CVE-2023-26818.json +++ b/2023/CVE-2023-26818.json @@ -13,10 +13,10 @@ "description": "CVE-2023-26818 Exploit MacOS TCC Bypass W\/ Telegram", "fork": false, "created_at": "2023-08-30T12:40:50Z", - "updated_at": "2023-09-01T19:19:35Z", + "updated_at": "2023-09-02T06:01:23Z", "pushed_at": "2023-08-30T12:50:02Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-30943.json b/2023/CVE-2023-30943.json index 7dd3a84852..27ef6c9cb1 100644 --- a/2023/CVE-2023-30943.json +++ b/2023/CVE-2023-30943.json @@ -13,10 +13,10 @@ "description": "CVE-2023-30943 RCE PoC", "fork": false, "created_at": "2023-08-31T08:18:17Z", - "updated_at": "2023-09-01T13:44:07Z", + "updated_at": "2023-09-02T03:12:39Z", "pushed_at": "2023-08-31T09:39:18Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-34039.json b/2023/CVE-2023-34039.json index 816f46d0a5..92d70f9385 100644 --- a/2023/CVE-2023-34039.json +++ b/2023/CVE-2023-34039.json @@ -13,20 +13,20 @@ "description": "VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)", "fork": false, "created_at": "2023-09-01T16:17:10Z", - "updated_at": "2023-09-01T18:23:21Z", + "updated_at": "2023-09-02T04:28:44Z", "pushed_at": "2023-09-01T16:21:56Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 1, + "forks": 2, + "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-34040.json b/2023/CVE-2023-34040.json index aff4064b96..5eb1855a8f 100644 --- a/2023/CVE-2023-34040.json +++ b/2023/CVE-2023-34040.json @@ -13,7 +13,7 @@ "description": "POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040", "fork": false, "created_at": "2023-08-30T12:09:15Z", - "updated_at": "2023-09-01T19:27:57Z", + "updated_at": "2023-09-02T01:30:20Z", "pushed_at": "2023-08-30T12:18:35Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2023/CVE-2023-35001.json b/2023/CVE-2023-35001.json index fd8cb8bbc9..019e0f0522 100644 --- a/2023/CVE-2023-35001.json +++ b/2023/CVE-2023-35001.json @@ -13,20 +13,20 @@ "description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit", "fork": false, "created_at": "2023-09-01T07:41:23Z", - "updated_at": "2023-09-01T20:45:46Z", + "updated_at": "2023-09-02T06:17:31Z", "pushed_at": "2023-09-01T07:48:43Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 23, + "forks": 3, + "watchers": 25, "score": 0, - "subscribers_count": 0 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36250.json b/2023/CVE-2023-36250.json index 11cbf12bb5..21dc5f3a57 100644 --- a/2023/CVE-2023-36250.json +++ b/2023/CVE-2023-36250.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 8da1d5c9bb..e7e006fcf9 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -103,10 +103,10 @@ "description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE", "fork": false, "created_at": "2023-08-24T22:24:34Z", - "updated_at": "2023-09-01T02:38:08Z", + "updated_at": "2023-09-02T02:12:45Z", "pushed_at": "2023-08-25T00:30:01Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 137, + "watchers_count": 137, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 136, + "watchers": 137, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-38389.json b/2023/CVE-2023-38389.json index d8bf875c96..2967744d16 100644 --- a/2023/CVE-2023-38389.json +++ b/2023/CVE-2023-38389.json @@ -13,10 +13,10 @@ "description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover", "fork": false, "created_at": "2023-08-27T00:30:16Z", - "updated_at": "2023-08-31T12:30:45Z", + "updated_at": "2023-09-02T01:51:31Z", "pushed_at": "2023-08-27T00:41:40Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index bee5fcff3e..8161058627 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2023-09-01T20:54:58Z", + "updated_at": "2023-09-02T05:27:06Z", "pushed_at": "2023-08-30T14:20:43Z", - "stargazers_count": 527, - "watchers_count": 527, + "stargazers_count": 530, + "watchers_count": 530, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 80, - "watchers": 527, + "watchers": 530, "score": 0, "subscribers_count": 5 }, @@ -137,10 +137,10 @@ "description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23", "fork": false, "created_at": "2023-08-27T21:49:37Z", - "updated_at": "2023-09-01T17:17:29Z", + "updated_at": "2023-09-02T06:09:15Z", "pushed_at": "2023-08-27T22:17:56Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -156,7 +156,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 92, + "watchers": 93, "score": 0, "subscribers_count": 1 }, @@ -507,13 +507,13 @@ "html_url": "https:\/\/github.com\/MorDavid" }, "html_url": "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC", - "description": "This is a basic proof of concept for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.", + "description": "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.", "fork": false, "created_at": "2023-08-30T19:55:11Z", - "updated_at": "2023-08-31T08:36:33Z", + "updated_at": "2023-09-02T02:22:57Z", "pushed_at": "2023-08-31T15:07:51Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -530,7 +530,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, @@ -566,6 +566,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-40868.json b/2023/CVE-2023-40868.json index 6f5bbd1b35..419f89e74f 100644 --- a/2023/CVE-2023-40868.json +++ b/2023/CVE-2023-40868.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-09-02T00:24:22Z", "updated_at": "2023-09-02T00:24:23Z", - "pushed_at": "2023-09-02T00:24:23Z", + "pushed_at": "2023-09-02T00:39:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-40869.json b/2023/CVE-2023-40869.json new file mode 100644 index 0000000000..37819c0607 --- /dev/null +++ b/2023/CVE-2023-40869.json @@ -0,0 +1,32 @@ +[ + { + "id": 686183183, + "name": "CVE-2023-40869", + "full_name": "MinoTauro2020\/CVE-2023-40869", + "owner": { + "login": "MinoTauro2020", + "id": 65294596, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4", + "html_url": "https:\/\/github.com\/MinoTauro2020" + }, + "html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-40869", + "description": " Cross Site Scripting vulnerability in mooSocial mooSocial Software v.3.1.6 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions", + "fork": false, + "created_at": "2023-09-02T00:47:37Z", + "updated_at": "2023-09-02T00:47:37Z", + "pushed_at": "2023-09-02T00:58:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-40924.json b/2023/CVE-2023-40924.json index 467b7438b8..cc543464c8 100644 --- a/2023/CVE-2023-40924.json +++ b/2023/CVE-2023-40924.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-41646.json b/2023/CVE-2023-41646.json index 7cccc855df..76fe631e60 100644 --- a/2023/CVE-2023-41646.json +++ b/2023/CVE-2023-41646.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4165.json b/2023/CVE-2023-4165.json index 55848e4524..c7e06dd7e3 100644 --- a/2023/CVE-2023-4165.json +++ b/2023/CVE-2023-4165.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4166.json b/2023/CVE-2023-4166.json index 8b593837d5..c81b0052e2 100644 --- a/2023/CVE-2023-4166.json +++ b/2023/CVE-2023-4166.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-41717.json b/2023/CVE-2023-41717.json index ab8dbe0369..271af7bfcc 100644 --- a/2023/CVE-2023-41717.json +++ b/2023/CVE-2023-41717.json @@ -13,10 +13,10 @@ "description": "This repository is to provide a write-up and PoC for CVE-2023-41717.", "fork": false, "created_at": "2023-08-31T08:10:22Z", - "updated_at": "2023-09-01T13:04:41Z", + "updated_at": "2023-09-02T01:50:14Z", "pushed_at": "2023-08-31T09:51:35Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-4696.json b/2023/CVE-2023-4696.json index 10888ed99b..cd980aa7e4 100644 --- a/2023/CVE-2023-4696.json +++ b/2023/CVE-2023-4696.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 25b757d3d8..932744470b 100644 --- a/README.md +++ b/README.md @@ -3064,6 +3064,9 @@ ### CVE-2023-40868 - [MinoTauro2020/CVE-2023-40868](https://github.com/MinoTauro2020/CVE-2023-40868) +### CVE-2023-40869 +- [MinoTauro2020/CVE-2023-40869](https://github.com/MinoTauro2020/CVE-2023-40869) + ### CVE-2023-40924 - [Yobing1/CVE-2023-40924](https://github.com/Yobing1/CVE-2023-40924)