{"vulnerability": "cve-2023-3129", "sightings": [{"uuid": "b25c13fd-2c02-4c78-9673-8ad9133dea34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "Telegram/-hVcj7RVS3QqYv1t3HP5vibVGlkq1PqMw8vAQDK6cSqIsGHo1g", "content": "", "creation_timestamp": "2024-09-20T10:03:40.000000Z"}, {"uuid": "5a104df0-f536-4e7f-87d7-3459257bf381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31292", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12353", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31292\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Sesami Cash Point &amp; Transport Optimizer (CPTO) 6.3.8.6 (#718), allows local attackers to obtain sensitive information and bypass authentication via \"Back Button Refresh\" attack.\n\ud83d\udccf Published: 2023-12-29T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T20:26:21.517Z\n\ud83d\udd17 References:\n1. https://herolab.usd.de/en/security-advisories/usd-2022-0051/", "creation_timestamp": "2025-04-17T20:58:25.000000Z"}, {"uuid": "a9082a2c-272f-4162-99bc-31c8f22de5ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31290", "type": "exploited", "source": "Telegram/JnH6PMCRXmemhB1HYnzKRTjCpyWUKfypC8rBmIVNn2RsVf8R", "content": "", "creation_timestamp": "2025-01-30T23:28:04.000000Z"}, {"uuid": "b8551fb0-f145-454d-82a4-9447db46882a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "https://t.me/SyrianElectronicArmyTEAM/3370", "content": "\ud83d\udce3 JYU TOOLS - UPDATE VIP 1.4\nWe are updating our VIP Tools, If you interested to Purchases Contact @eouxx1.\n\n\ud83d\udda5 Update: Exploit Shells, Uploaders, Wso, Filemanager more Reliable and Focused to our Private Path\n\ud83d\udda5 Update: System Scanner for Exploit Shells, Uploaders, Wso, Filemanager\n\ud83d\udda5 Update: Update private path from 721 Lines of Path to 80.000+\n\ud83d\udda5 Update: Zone-x Sec Grabber with Options\n\ud83d\udda5 Note: Improved and Monitoring our Tools.\n\ud83d\udda5 Added: Grab Domain Keyword\n\ud83d\udda5 Added: Grab Domain By Extension\n\ud83d\udda5 Added: Shell Cracker, Will Bruteforcing Shell with Password.\n\ud83d\udda5 Added: Subdomain Grabber \n\ud83d\udda5 Added: Defacer-net Grabber\n\ud83d\udda5 Added: Defacer-mirror Grabber\n\ud83d\udda5 Added: New Menu (Filtering Menu &amp; Cve Menu)\n\ud83d\udda5 Added: Filter Combo Logs (Can Get go.id ac.id sch.id Site!)\n\ud83d\udda5 Added: Cve-2017-9841 Scanner\n\ud83d\udda5 Added: Cve-2022-4395 Scanner + Auto Upload Shell\n\ud83d\udda5 Added: Cve-2023-3129 Scanner\n\n\ud83d\udcb8 Price: 95$/1.5jt idr\n\n\ud83d\udcdc Note: Open Source Tools Script Lifetime &amp; Free Update\n\n\u2709\ufe0f Contact Person\n\u2708\ufe0f Purchasing\n\u2708\ufe0f Channels", "creation_timestamp": "2024-09-19T15:32:10.000000Z"}, {"uuid": "14c1c106-e961-4308-ae74-bf9b25649b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31299", "type": "seen", "source": "https://t.me/cibsecurity/73899", "content": "\u203c\ufe0fCVE-2023-31299\u203c\ufe0f\n\nCross Site Scripting XSS vulnerability in Sesami Cash Point  Transport Optimizer CPTO version 6.3.8.6 718, allows remote attackers to execute arbitrary code via the Barcode field of a container.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:34:31.000000Z"}, {"uuid": "cfabe00d-8300-435a-ba06-e463b2d53172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "Telegram/RDVp2vOk6EiTX4SOJlKW-Uun4ltPNUHnHI-9KHiknRLfnJ55dQ", "content": "", "creation_timestamp": "2024-09-21T06:29:38.000000Z"}, {"uuid": "5c279819-48a5-4d5e-882a-7209d308ddd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "Telegram/M-RM6JUeRS-yLbXH47dffFKYpTJTdkiqAiI6xYlcLmjs7Mv7LQ", "content": "", "creation_timestamp": "2024-09-19T15:32:04.000000Z"}, {"uuid": "febfa502-dc78-4f55-a2b9-f2eeec354965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31294", "type": "seen", "source": "https://t.me/cibsecurity/73877", "content": "\u203c\ufe0fCVE-2023-31294\u203c\ufe0f\n\nCSV Injection vulnerability in Sesami Cash Point  Transport Optimizer CPTO version 6.3.8.6 718, allows remote attackers to obtain sensitive information via the Delivery Name field.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:32:43.000000Z"}, {"uuid": "25f7091b-f389-4939-9a5d-ad69bc5b56c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31295", "type": "seen", "source": "https://t.me/cibsecurity/73902", "content": "\u203c\ufe0fCVE-2023-31295\u203c\ufe0f\n\nCSV Injection vulnerability in Sesami Cash Point  Transport Optimizer CPTO version 6.3.8.6 718, allows remote attackers to obtain sensitive information via the User Profile field.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:34:46.000000Z"}, {"uuid": "4ca5e055-cb07-440b-995b-38f7bdab8dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31296", "type": "seen", "source": "https://t.me/cibsecurity/73883", "content": "\u203c\ufe0fCVE-2023-31296\u203c\ufe0f\n\nCSV Injection vulnerability in Sesami Cash Point  Transport Optimizer CPTO version 6.3.8.6 718, allows attackers to obtain sensitive information via the User Name field.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:33:13.000000Z"}, {"uuid": "455d8401-2046-4d84-a866-cb519ab4990b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31298", "type": "seen", "source": "https://t.me/cibsecurity/73862", "content": "\u203c\ufe0fCVE-2023-31298\u203c\ufe0f\n\nCross Site Scripting XSS vulnerability in Sesami Cash Point  Transport Optimizer CPTO version 6.3.8.6 718, allows remote attackers to execute arbitrary code and obtain sensitive information via the User ID field when creating a new system user.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:31:29.000000Z"}, {"uuid": "cc20e3fc-30c4-4645-8e70-7c01d47444ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31292", "type": "seen", "source": "https://t.me/cibsecurity/73861", "content": "\u203c\ufe0fCVE-2023-31292\u203c\ufe0f\n\nAn issue was discovered in Sesami Cash Point  Transport Optimizer CPTO 6.3.8.6 718, allows local attackers to obtain sensitive information and bypass authentication via \"Back Button Refresh\" attack.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:31:24.000000Z"}, {"uuid": "08f611b6-a9a8-435d-b41a-491b951812ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31293", "type": "seen", "source": "https://t.me/cibsecurity/73876", "content": "\u203c\ufe0fCVE-2023-31293\u203c\ufe0f\n\nAn issue was discovered in Sesami Cash Point  Transport Optimizer CPTO 6.3.8.6 718, allows remote attackers to obtain sensitive information and bypass profile restriction via improper access control in the Reader system user's web browser, allowing the journal to be displayed, despite the option being disabled.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:32:38.000000Z"}, {"uuid": "166f6aaa-c32f-4071-b785-676a5f953f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "https://t.me/JATENGSEMARANG/1563", "content": "\ud83d\udce3 JYU TOOLS - UPDATE VIP 1.4\nWe are updating our VIP Tools, If you interested to Purchases Contact @eouxx1.\n\n\ud83d\udda5 Update: Exploit Shells, Uploaders, Wso, Filemanager more Reliable and Focused to our Private Path\n\ud83d\udda5 Update: System Scanner for Exploit Shells, Uploaders, Wso, Filemanager\n\ud83d\udda5 Update: Update private path from 721 Lines of Path to 80.000+\n\ud83d\udda5 Update: Zone-x Sec Grabber with Options\n\ud83d\udda5 Note: Improved and Monitoring our Tools.\n\ud83d\udda5 Added: Grab Domain Keyword\n\ud83d\udda5 Added: Grab Domain By Extension\n\ud83d\udda5 Added: Shell Cracker, Will Bruteforcing Shell with Password.\n\ud83d\udda5 Added: Subdomain Grabber \n\ud83d\udda5 Added: Defacer-net Grabber\n\ud83d\udda5 Added: Defacer-mirror Grabber\n\ud83d\udda5 Added: New Menu (Filtering Menu &amp; Cve Menu)\n\ud83d\udda5 Added: Filter Combo Logs (Can Get go.id ac.id sch.id Site!)\n\ud83d\udda5 Added: Cve-2017-9841 Scanner\n\ud83d\udda5 Added: Cve-2022-4395 Scanner + Auto Upload Shell\n\ud83d\udda5 Added: Cve-2023-3129 Scanner\n\n\ud83d\udcb8 Price: 95$/1.5jt idr\n\n\ud83d\udcdc Note: Open Source Tools Script Lifetime &amp; Free Update\n\n\u2709\ufe0f Contact Person\n\u2708\ufe0f Purchasing\n\u2708\ufe0f Channels", "creation_timestamp": "2024-09-20T10:03:43.000000Z"}, {"uuid": "e3e1134a-217a-41d7-b9dd-deb38d63c6e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "published-proof-of-concept", "source": "https://t.me/JATENGSEMARANG/1545", "content": "\ud83d\udce3 JYU TOOLS - UPDATE VIP 1.4\nWe are updating our VIP Tools, If you interested to Purchases Contact @eouxx1.\n\n\ud83d\udda5 Update: Exploit Shells, Uploaders, Wso, Filemanager more Reliable and Focused to our Private Path\n\ud83d\udda5 Update: System Scanner for Exploit Shells, Uploaders, Wso, Filemanager\n\ud83d\udda5 Update: Update private path from 721 Lines of Path to 80.000+\n\ud83d\udda5 Update: Zone-x Sec Grabber with Options\n\ud83d\udda5 Note: Improved and Monitoring our Tools.\n\ud83d\udda5 Added: Grab Domain Keyword\n\ud83d\udda5 Added: Grab Domain By Extension\n\ud83d\udda5 Added: Shell Cracker, Will Bruteforcing Shell with Password.\n\ud83d\udda5 Added: Subdomain Grabber \n\ud83d\udda5 Added: Defacer-net Grabber\n\ud83d\udda5 Added: Defacer-mirror Grabber\n\ud83d\udda5 Added: New Menu (Filtering Menu &amp; Cve Menu)\n\ud83d\udda5 Added: Filter Combo Logs (Can Get go.id ac.id sch.id Site!)\n\ud83d\udda5 Added: Cve-2017-9841 Scanner\n\ud83d\udda5 Added: Cve-2022-4395 Scanner + Auto Upload Shell\n\ud83d\udda5 Added: Cve-2023-3129 Scanner\n\n\ud83d\udcb8 Price: 95$/1.5jt idr\n\n\ud83d\udcdc Note: Open Source Tools Script Lifetime &amp; Free Update\n\n\u2709\ufe0f Contact Person\n\u2708\ufe0f Purchasing\n\u2708\ufe0f Channels", "creation_timestamp": "2024-09-19T15:32:09.000000Z"}, {"uuid": "a930c0c6-358f-4385-b524-0143ecc34b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31294", "type": "seen", "source": "https://t.me/ctinow/160315", "content": "https://ift.tt/b6jMJAG\nCVE-2023-31294", "creation_timestamp": "2023-12-29T04:26:33.000000Z"}, {"uuid": "c3a36f5d-cce4-4f09-8a35-9e15e60f308a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31293", "type": "seen", "source": "https://t.me/ctinow/160314", "content": "https://ift.tt/iOteGjr\nCVE-2023-31293", "creation_timestamp": "2023-12-29T04:26:32.000000Z"}, {"uuid": "67c8e00d-37d8-43e1-a3a7-faa226f10457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31295", "type": "seen", "source": "https://t.me/ctinow/160356", "content": "https://ift.tt/syd1rhZ\nCVE-2023-31295", "creation_timestamp": "2023-12-29T07:26:43.000000Z"}, {"uuid": "1fa2e1e7-1f97-4cdd-a87c-e5e5ed897868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31299", "type": "seen", "source": "https://t.me/ctinow/160349", "content": "https://ift.tt/UCZ5Fy3\nCVE-2023-31299", "creation_timestamp": "2023-12-29T06:26:39.000000Z"}, {"uuid": "dd4ff24a-bcef-4b11-9427-1d70499da132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31297", "type": "seen", "source": "https://t.me/ctinow/159158", "content": "https://ift.tt/Kk3Eu6o\nCVE-2023-31297", "creation_timestamp": "2023-12-25T08:26:21.000000Z"}, {"uuid": "9049801b-5351-4fb4-acca-974e65442d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "exploited", "source": "https://t.me/FanatixRipperNews/693", "content": "\ud83d\udce3 JYU TOOLS - UPDATE VIP 1.4\nWe are updating our VIP Tools, If you interested to Purchases Contact @eouxx1.\n\n\ud83d\udda5 Update: Exploit Shells, Uploaders, Wso, Filemanager more Reliable and Focused to our Private Path\n\ud83d\udda5 Update: System Scanner for Exploit Shells, Uploaders, Wso, Filemanager\n\ud83d\udda5 Update: Update private path from 721 Lines of Path to 80.000+\n\ud83d\udda5 Update: Zone-x Sec Grabber with Options\n\ud83d\udda5 Note: Improved and Monitoring our Tools.\n\ud83d\udda5 Added: Grab Domain Keyword\n\ud83d\udda5 Added: Grab Domain By Extension\n\ud83d\udda5 Added: Shell Cracker, Will Bruteforcing Shell with Password.\n\ud83d\udda5 Added: Subdomain Grabber \n\ud83d\udda5 Added: Defacer-net Grabber\n\ud83d\udda5 Added: Defacer-mirror Grabber\n\ud83d\udda5 Added: New Menu (Filtering Menu &amp; Cve Menu)\n\ud83d\udda5 Added: Filter Combo Logs (Can Get go.id ac.id sch.id Site!)\n\ud83d\udda5 Added: Cve-2017-9841 Scanner\n\ud83d\udda5 Added: Cve-2022-4395 Scanner + Auto Upload Shell\n\ud83d\udda5 Added: Cve-2023-3129 Scanner\n\n\ud83d\udcb8 Price: 95$/1.5jt idr\n\n\ud83d\udcdc Note: Open Source Tools Script Lifetime &amp; Free Update\n\n\u2709\ufe0f Contact Person\n\u2708\ufe0f Purchasing\n\u2708\ufe0f Channels", "creation_timestamp": "2024-09-19T15:32:04.000000Z"}, {"uuid": "40b9327e-99da-49d8-905b-e4ae5cd54f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3129", "type": "exploited", "source": "https://t.me/FanatixRipperNews/726", "content": "\ud83d\udce3 JYU TOOLS - UPDATE VIP 1.4\nWe are updating our VIP Tools, If you interested to Purchases Contact @eouxx1.\n\n\ud83d\udda5 Update: Exploit Shells, Uploaders, Wso, Filemanager more Reliable and Focused to our Private Path\n\ud83d\udda5 Update: System Scanner for Exploit Shells, Uploaders, Wso, Filemanager\n\ud83d\udda5 Update: Update private path from 721 Lines of Path to 80.000+\n\ud83d\udda5 Update: Zone-x Sec Grabber with Options\n\ud83d\udda5 Note: Improved and Monitoring our Tools.\n\ud83d\udda5 Added: Grab Domain Keyword\n\ud83d\udda5 Added: Grab Domain By Extension\n\ud83d\udda5 Added: Shell Cracker, Will Bruteforcing Shell with Password.\n\ud83d\udda5 Added: Subdomain Grabber \n\ud83d\udda5 Added: Defacer-net Grabber\n\ud83d\udda5 Added: Defacer-mirror Grabber\n\ud83d\udda5 Added: New Menu (Filtering Menu &amp; Cve Menu)\n\ud83d\udda5 Added: Filter Combo Logs (Can Get go.id ac.id sch.id Site!)\n\ud83d\udda5 Added: Cve-2017-9841 Scanner\n\ud83d\udda5 Added: Cve-2022-4395 Scanner + Auto Upload Shell\n\ud83d\udda5 Added: Cve-2023-3129 Scanner\n\n\ud83d\udcb8 Price: 95$/1.5jt idr\n\n\ud83d\udcdc Note: Open Source Tools Script Lifetime &amp; Free Update\n\n\u2709\ufe0f Contact Person\n\u2708\ufe0f Purchasing\n\u2708\ufe0f Channels", "creation_timestamp": "2024-09-21T06:29:38.000000Z"}, {"uuid": "27882243-5181-447f-a833-b3899eb260a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31294", "type": "seen", "source": "https://t.me/ctinow/170650", "content": "https://ift.tt/psABQoz\nCVE-2023-31294 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 Delivery Name csv injection (usd-2022-0052)", "creation_timestamp": "2024-01-20T15:17:14.000000Z"}, {"uuid": "58c23993-24e5-4f49-9e92-353fa9f4e2d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31295", "type": "seen", "source": "https://t.me/ctinow/170648", "content": "https://ift.tt/SN6Mwrd\nCVE-2023-31295 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 User Profile Field csv injection (usd-2022-0053)", "creation_timestamp": "2024-01-20T15:17:12.000000Z"}, {"uuid": "bc0ed6d3-953a-4374-a090-0710f2e20fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31293", "type": "seen", "source": "https://t.me/ctinow/170646", "content": "https://ift.tt/VRvCStF\nCVE-2023-31293 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 information disclosure (usd-2022-0061)", "creation_timestamp": "2024-01-20T15:17:09.000000Z"}, {"uuid": "057bc487-5e90-4d57-97a3-9af9cbc0d31d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31299", "type": "seen", "source": "https://t.me/ctinow/170670", "content": "https://ift.tt/JPb5Tk4\nCVE-2023-31299 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 Barcode cross site scripting (usd-2022-0055)", "creation_timestamp": "2024-01-20T16:51:42.000000Z"}, {"uuid": "679c0ed9-db53-406f-aef4-7b9d97f87646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31296", "type": "seen", "source": "https://t.me/ctinow/170665", "content": "https://ift.tt/icdjFmR\nCVE-2023-31296 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 User Name information disclosure (usd-2022-0054)", "creation_timestamp": "2024-01-20T16:16:33.000000Z"}, {"uuid": "f8006aaf-fdc9-408d-b0e9-0dcd236d50c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31298", "type": "seen", "source": "https://t.me/ctinow/170662", "content": "https://ift.tt/VTRl1Io\nCVE-2023-31298 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 User ID cross site scripting (usd-2022-0060)", "creation_timestamp": "2024-01-20T16:16:29.000000Z"}, {"uuid": "a3bd0294-9112-41e9-9519-e4b23ea72151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31292", "type": "seen", "source": "https://t.me/ctinow/170656", "content": "https://ift.tt/NH6Q5CY\nCVE-2023-31292 | Sesami Cash Point &amp; Transport Optimizer 6.3.8.6 Back Button Refresh information disclosure (usd-2022-0051)", "creation_timestamp": "2024-01-20T15:46:08.000000Z"}, {"uuid": "47561291-f33f-4363-9d6c-46e2e3405f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31296", "type": "seen", "source": "https://t.me/ctinow/160328", "content": "https://ift.tt/j45MG9w\nCVE-2023-31296", "creation_timestamp": "2023-12-29T05:26:48.000000Z"}, {"uuid": "ede491f4-5f65-4708-b1de-cd7df132d644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31298", "type": "seen", "source": "https://t.me/ctinow/160289", "content": "https://ift.tt/fGSBHTz\nCVE-2023-31298", "creation_timestamp": "2023-12-29T03:26:21.000000Z"}, {"uuid": "8722a70c-3432-46b0-808f-a06435d5ff87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31292", "type": "seen", "source": "https://t.me/ctinow/160288", "content": "https://ift.tt/ND8wWFY\nCVE-2023-31292", "creation_timestamp": "2023-12-29T03:26:20.000000Z"}]}