Auto Update 2024/06/17 00:29:13

This commit is contained in:
motikan2010-bot 2024-06-17 09:29:13 +09:00
parent 41138a1aec
commit b9dd205938
23 changed files with 114 additions and 75 deletions

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-06-14T13:45:55Z", "updated_at": "2024-06-17T00:20:41Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 738, "stargazers_count": 739,
"watchers_count": 738, "watchers_count": 739,
"has_discussions": false, "has_discussions": false,
"forks_count": 118, "forks_count": 118,
"allow_forking": true, "allow_forking": true,
@ -60,7 +60,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 118, "forks": 118,
"watchers": 738, "watchers": 739,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-03-12T20:57:24Z", "created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-06-06T16:13:15Z", "updated_at": "2024-06-16T23:30:35Z",
"pushed_at": "2023-05-20T05:55:45Z", "pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 514, "stargazers_count": 515,
"watchers_count": 514, "watchers_count": 515,
"has_discussions": false, "has_discussions": false,
"forks_count": 138, "forks_count": 138,
"allow_forking": true, "allow_forking": true,
@ -1197,7 +1197,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 138, "forks": 138,
"watchers": 514, "watchers": 515,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
}, },

View file

@ -18,7 +18,7 @@
"stargazers_count": 71, "stargazers_count": 71,
"watchers_count": 71, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"vulnerabilities" "vulnerabilities"
], ],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 18,
"watchers": 71, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false, "fork": false,
"created_at": "2022-09-12T19:22:44Z", "created_at": "2022-09-12T19:22:44Z",
"updated_at": "2024-06-16T02:14:39Z", "updated_at": "2024-06-16T23:55:01Z",
"pushed_at": "2022-09-19T19:41:34Z", "pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 264, "stargazers_count": 265,
"watchers_count": 264, "watchers_count": 265,
"has_discussions": false, "has_discussions": false,
"forks_count": 37, "forks_count": 37,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 37, "forks": 37,
"watchers": 264, "watchers": 265,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -2,14 +2,14 @@
{ {
"id": 797293097, "id": 797293097,
"name": "py_trustwallet_wasm", "name": "py_trustwallet_wasm",
"full_name": "00000rest\/py_trustwallet_wasm", "full_name": "oooooorest\/py_trustwallet_wasm",
"owner": { "owner": {
"login": "00000rest", "login": "oooooorest",
"id": 121653522, "id": 121653522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121653522?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121653522?v=4",
"html_url": "https:\/\/github.com\/00000rest" "html_url": "https:\/\/github.com\/oooooorest"
}, },
"html_url": "https:\/\/github.com\/00000rest\/py_trustwallet_wasm", "html_url": "https:\/\/github.com\/oooooorest\/py_trustwallet_wasm",
"description": "(CVE-2023-31290) Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023.", "description": "(CVE-2023-31290) Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023.",
"fork": false, "fork": false,
"created_at": "2024-05-07T15:02:22Z", "created_at": "2024-05-07T15:02:22Z",

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-06-16T17:30:40Z", "updated_at": "2024-06-16T20:46:47Z",
"pushed_at": "2024-06-12T19:17:54Z", "pushed_at": "2024-06-12T19:17:54Z",
"stargazers_count": 880, "stargazers_count": 882,
"watchers_count": 880, "watchers_count": 882,
"has_discussions": false, "has_discussions": false,
"forks_count": 150, "forks_count": 151,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 150, "forks": 151,
"watchers": 880, "watchers": 882,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 46, "stargazers_count": 46,
"watchers_count": 46, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 36, "forks_count": 37,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 37,
"watchers": 46, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 84, "stargazers_count": 84,
"watchers_count": 84, "watchers_count": 84,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 21,
"watchers": 84, "watchers": 84,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -18,7 +18,7 @@
"stargazers_count": 32, "stargazers_count": 32,
"watchers_count": 32, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"cve-2024-20767" "cve-2024-20767"
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 9,
"watchers": 32, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false, "fork": false,
"created_at": "2024-01-27T19:34:48Z", "created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-06-05T08:57:15Z", "updated_at": "2024-06-16T22:34:00Z",
"pushed_at": "2024-03-16T07:55:41Z", "pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 61, "stargazers_count": 62,
"watchers_count": 61, "watchers_count": 62,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -272,7 +272,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 61, "watchers": 62,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -1120,7 +1120,7 @@
"description": " CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.", "description": " CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.",
"fork": false, "fork": false,
"created_at": "2024-06-03T12:18:35Z", "created_at": "2024-06-03T12:18:35Z",
"updated_at": "2024-06-06T06:35:49Z", "updated_at": "2024-06-17T00:14:40Z",
"pushed_at": "2024-06-03T14:09:22Z", "pushed_at": "2024-06-03T14:09:22Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -103,7 +103,7 @@
"description": "(Mirorring)", "description": "(Mirorring)",
"fork": false, "fork": false,
"created_at": "2024-02-29T20:53:42Z", "created_at": "2024-02-29T20:53:42Z",
"updated_at": "2024-05-03T15:38:40Z", "updated_at": "2024-06-16T18:49:22Z",
"pushed_at": "2024-02-29T21:04:40Z", "pushed_at": "2024-02-29T21:04:40Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false, "fork": false,
"created_at": "2024-06-10T17:02:03Z", "created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-16T15:28:24Z", "updated_at": "2024-06-16T23:08:42Z",
"pushed_at": "2024-06-15T10:32:38Z", "pushed_at": "2024-06-15T10:32:38Z",
"stargazers_count": 208, "stargazers_count": 209,
"watchers_count": 208, "watchers_count": 209,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 208, "watchers": 209,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -43,10 +43,10 @@
"description": "Windows LPE", "description": "Windows LPE",
"fork": false, "fork": false,
"created_at": "2024-06-11T08:03:29Z", "created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-06-15T15:27:13Z", "updated_at": "2024-06-17T00:05:18Z",
"pushed_at": "2024-06-11T20:41:59Z", "pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -73,10 +73,10 @@
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel", "description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
"fork": false, "fork": false,
"created_at": "2024-06-12T11:11:16Z", "created_at": "2024-06-12T11:11:16Z",
"updated_at": "2024-06-16T12:08:50Z", "updated_at": "2024-06-17T00:16:45Z",
"pushed_at": "2024-06-13T07:30:48Z", "pushed_at": "2024-06-13T07:30:48Z",
"stargazers_count": 129, "stargazers_count": 132,
"watchers_count": 129, "watchers_count": 132,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 129, "watchers": 132,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956", "description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false, "fork": false,
"created_at": "2024-05-01T01:58:28Z", "created_at": "2024-05-01T01:58:28Z",
"updated_at": "2024-06-15T08:32:36Z", "updated_at": "2024-06-16T21:33:24Z",
"pushed_at": "2024-05-03T11:28:21Z", "pushed_at": "2024-05-03T11:28:21Z",
"stargazers_count": 58, "stargazers_count": 59,
"watchers_count": 58, "watchers_count": 59,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 58, "watchers": 59,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 73, "stargazers_count": 73,
"watchers_count": 73, "watchers_count": 73,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 13,
"watchers": 73, "watchers": 73,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)", "description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false, "fork": false,
"created_at": "2024-06-10T06:12:20Z", "created_at": "2024-06-10T06:12:20Z",
"updated_at": "2024-06-16T09:04:13Z", "updated_at": "2024-06-16T20:26:58Z",
"pushed_at": "2024-06-13T08:40:57Z", "pushed_at": "2024-06-13T08:40:57Z",
"stargazers_count": 74, "stargazers_count": 75,
"watchers_count": 74, "watchers_count": 75,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 74, "watchers": 75,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-30078 Detection and Command Execution Script", "description": "CVE-2024-30078 Detection and Command Execution Script",
"fork": false, "fork": false,
"created_at": "2024-06-15T19:37:56Z", "created_at": "2024-06-15T19:37:56Z",
"updated_at": "2024-06-16T17:08:26Z", "updated_at": "2024-06-16T23:21:22Z",
"pushed_at": "2024-06-15T20:21:26Z", "pushed_at": "2024-06-15T20:21:26Z",
"stargazers_count": 25, "stargazers_count": 27,
"watchers_count": 25, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 25, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -288,13 +288,13 @@
"stargazers_count": 138, "stargazers_count": 138,
"watchers_count": 138, "watchers_count": 138,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 21,
"watchers": 138, "watchers": 138,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

32
2024/CVE-2024-38396.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 815829677,
"name": "poc-cve-2024-38396",
"full_name": "vin01\/poc-cve-2024-38396",
"owner": {
"login": "vin01",
"id": 30344579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30344579?v=4",
"html_url": "https:\/\/github.com\/vin01"
},
"html_url": "https:\/\/github.com\/vin01\/poc-cve-2024-38396",
"description": "PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution",
"fork": false,
"created_at": "2024-06-16T09:43:46Z",
"updated_at": "2024-06-16T18:48:23Z",
"pushed_at": "2024-06-16T09:51:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false, "fork": false,
"created_at": "2024-05-20T10:02:23Z", "created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-06-14T18:52:22Z", "updated_at": "2024-06-17T00:11:20Z",
"pushed_at": "2024-06-07T03:28:00Z", "pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 63, "stargazers_count": 64,
"watchers_count": 63, "watchers_count": 64,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 63, "watchers": 64,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false, "fork": false,
"created_at": "2024-06-07T09:52:54Z", "created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-16T13:01:24Z", "updated_at": "2024-06-16T23:58:03Z",
"pushed_at": "2024-06-07T09:53:15Z", "pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 130, "stargazers_count": 131,
"watchers_count": 130, "watchers_count": 131,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -175,7 +175,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 130, "watchers": 131,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -2753,6 +2753,13 @@
- [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393) - [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393)
### CVE-2024-38396 (2024-06-16)
<code>An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
</code>
- [vin01/poc-cve-2024-38396](https://github.com/vin01/poc-cve-2024-38396)
### CVE-2024-65230 ### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230) - [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
@ -6174,7 +6181,7 @@
<code>Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address. <code>Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
</code> </code>
- [00000rest/py_trustwallet_wasm](https://github.com/00000rest/py_trustwallet_wasm) - [oooooorest/py_trustwallet_wasm](https://github.com/oooooorest/py_trustwallet_wasm)
### CVE-2023-31320 (2023-11-14) ### CVE-2023-31320 (2023-11-14)