{"vulnerability": "CVE-2023-4399", "sightings": [{"uuid": "9dae3624-2cc2-49ed-9ffc-89333fdedf65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43994\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-16T19:11:34.836Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43994.md", "creation_timestamp": "2025-06-16T19:40:46.000000Z"}, {"uuid": "45a5474a-c396-4bd0-9229-87803c2b1f13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43995", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43995\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in picot.golf mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:23:12.678Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43995.md", "creation_timestamp": "2025-06-20T19:43:52.000000Z"}, {"uuid": "6c137193-3be4-4c40-86df-9caada1e8d6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43996", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19059", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43996\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Q co ltd mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:23:53.793Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43996.md", "creation_timestamp": "2025-06-20T19:43:49.000000Z"}, {"uuid": "c25052a8-f25d-4e00-9a77-f8f9512bba34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43997", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19058", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43997\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:24:39.019Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43997.md", "creation_timestamp": "2025-06-20T19:43:48.000000Z"}, {"uuid": "98926f9d-2f7b-4f49-b12c-20065b69a0e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43992", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19062", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43992\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in STOCKMAN GROUP mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:22:28.546Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43992.md", "creation_timestamp": "2025-06-20T19:43:53.000000Z"}, {"uuid": "d529f035-de48-488f-ba9e-c0a5106cb25d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/727", "content": "\u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u0631\u0648\u0631 \u062a\u0631\u0645\u06cc\u0646\u0627\u0644 NPort 6000 \u0648 \u0645\u062f\u06cc\u0631 \u062f\u0631\u0627\u06cc\u0648\u0631 NPort \u0648\u06cc\u0646\u062f\u0648\u0632 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u062e\u0637\u0627\u0647\u0627\u06cc\u06cc \u062f\u0631 \u0631\u0648\u0646\u062f \u062a\u0623\u06cc\u06cc\u062f \u0627\u0639\u062a\u0628\u0627\u0631 \u06af\u0648\u0627\u0647\u06cc \u0627\u0633\u062a.  \n\n\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06cc\u06a9 \u062d\u0645\u0644\u0647 Man-in-the-Middle \u0627\u0646\u062c\u0627\u0645 \u062f\u0647\u062f.\n\n BDU: 2023-01295\n CVE-2023-43994\n\n \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc \u0648 \u062a\u062d\u0631\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0639\u0645\u0627\u0644 \u0634\u062f\u0647\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0645\u0627\u06cc\u0632 \u0641\u06cc\u0632\u06cc\u06a9\u06cc \u06cc\u0627 \u0645\u0646\u0637\u0642\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0634\u0628\u06a9\u0647 \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\u06cc \u0628\u0627 \u0633\u0631\u0648\u0631 \u062a\u0631\u0645\u06cc\u0646\u0627\u0644 Moxa NPort \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0627 \u062a\u062e\u0635\u06cc\u0635 \u06cc\u06a9 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u062c\u062f\u0627\u06af\u0627\u0646\u0647.\n - \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a).\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\n https://www.moxa.com/en/support/product-support/security-advisory/nport-6000-series-and-utility-improper-certificate-validation-vulnerabilities\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-03-30T20:03:02.000000Z"}, {"uuid": "fe0da9e8-0163-4e6c-9660-40b44da65baa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43996", "type": "seen", "source": "https://t.me/arpsyndicate/3047", "content": "#ExploitObserverAlert\n\nCVE-2023-43996\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43996. An issue in Q co ltd mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T19:41:19.000000Z"}, {"uuid": "f94ce567-dc9c-41bf-9b38-bebae7651a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43998", "type": "seen", "source": "https://t.me/arpsyndicate/3044", "content": "#ExploitObserverAlert\n\nCVE-2023-43998\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43998. An issue in Books-futaba mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T19:20:14.000000Z"}, {"uuid": "e72ad159-cb95-4da0-9c27-a7eda4ad2a8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "seen", "source": "https://t.me/arpsyndicate/3099", "content": "#ExploitObserverAlert\n\nCVE-2023-43994\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43994. An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T22:31:43.000000Z"}, {"uuid": "aa60b3a3-922c-485c-8f16-809da255f255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43990", "type": "seen", "source": "https://t.me/arpsyndicate/3098", "content": "#ExploitObserverAlert\n\nCVE-2023-43990\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43990. An issue in cherub-hair mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T22:29:35.000000Z"}, {"uuid": "6e7f6691-c3d3-4608-9e23-49bf682f052b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43993", "type": "seen", "source": "https://t.me/arpsyndicate/3100", "content": "#ExploitObserverAlert\n\nCVE-2023-43993\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43993. An issue in smaregi_app_market mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T22:33:46.000000Z"}, {"uuid": "dc6c979c-71da-4b3c-9859-1760c6a02611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43992", "type": "seen", "source": "https://t.me/arpsyndicate/3090", "content": "#ExploitObserverAlert\n\nCVE-2023-43992\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43992. An issue in STOCKMAN GROUP mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T22:08:58.000000Z"}, {"uuid": "aabcc670-10ed-4850-a26c-a736e5833bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43997", "type": "seen", "source": "https://t.me/arpsyndicate/3011", "content": "#ExploitObserverAlert\n\nCVE-2023-43997\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43997. An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T17:20:23.000000Z"}, {"uuid": "5d152dd8-3cc2-4175-87bb-41a6426752c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43995", "type": "seen", "source": "https://t.me/arpsyndicate/2978", "content": "#ExploitObserverAlert\n\nCVE-2023-43995\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43995. An issue in picot.golf mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T15:11:27.000000Z"}, {"uuid": "b621e464-7f6e-4086-ba69-2b795ebd4900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43999", "type": "seen", "source": "https://t.me/ctinow/187050", "content": "https://ift.tt/yAPZnHj\nCVE-2023-43999 | COLORFUL_laundry mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T21:21:38.000000Z"}, {"uuid": "0fc8b6db-7205-4096-b56c-a89ae271f594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "seen", "source": "https://t.me/ctinow/187038", "content": "https://ift.tt/8H5Ndwz\nCVE-2023-43994 | makotoya mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:21:30.000000Z"}, {"uuid": "75182a03-3033-4175-bc8f-361326332b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43993", "type": "seen", "source": "https://t.me/ctinow/187037", "content": "https://ift.tt/YKDMtlb\nCVE-2023-43993 | smaregi_app_market mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:21:29.000000Z"}, {"uuid": "35db494f-e6df-41c2-94b7-1f7001db656e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43992", "type": "seen", "source": "https://t.me/ctinow/187036", "content": "https://ift.tt/zMvb6mR\nCVE-2023-43992 | Stockman Group mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:21:28.000000Z"}, {"uuid": "65c714cb-ee43-4a71-9ad2-52fa71ea452d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43990", "type": "seen", "source": "https://t.me/ctinow/187029", "content": "https://ift.tt/AVBKYN5\nCVE-2023-43990 | cherub-hair mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T19:46:58.000000Z"}, {"uuid": "1d0d4c78-85e2-49f9-99ac-df7bfae0e523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43991", "type": "seen", "source": "https://t.me/ctinow/187030", "content": "https://ift.tt/epaLJ7E\nCVE-2023-43991 | PRIMA CLINIC mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T19:46:59.000000Z"}, {"uuid": "c400f12d-280c-49f4-9505-b2b8949c4013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43997", "type": "seen", "source": "https://t.me/ctinow/187042", "content": "https://ift.tt/UpyBY5F\nCVE-2023-43997 | Yoruichi hobby base mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:51:53.000000Z"}, {"uuid": "c83fdd42-8919-42f8-9096-5bf609960d0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43996", "type": "seen", "source": "https://t.me/ctinow/187040", "content": "https://ift.tt/0ZdR7eu\nCVE-2023-43996 | mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:21:33.000000Z"}, {"uuid": "dae71f58-ad3b-47df-bd30-682fdfa7f4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43995", "type": "seen", "source": "https://t.me/ctinow/187039", "content": "https://ift.tt/IWNfHSX\nCVE-2023-43995 | picot.golf mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:21:32.000000Z"}, {"uuid": "2cabbba0-f3b1-41f1-bf84-8a2ce5fa844c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43998", "type": "seen", "source": "https://t.me/ctinow/187044", "content": "https://ift.tt/4d1Ptec\nCVE-2023-43998 | Books-futaba mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T20:51:55.000000Z"}, {"uuid": "f16c6274-9590-41b3-8c89-819f39eb101b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43998", "type": "seen", "source": "https://t.me/ctinow/174538", "content": "https://ift.tt/OSDnRi1\nCVE-2023-43998 Exploit", "creation_timestamp": "2024-01-26T23:16:41.000000Z"}, {"uuid": "12f6f660-7dd6-4de0-be43-f0a011e6df8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43999", "type": "seen", "source": "https://t.me/ctinow/174537", "content": "https://ift.tt/9nLtSPk\nCVE-2023-43999 Exploit", "creation_timestamp": "2024-01-26T23:16:40.000000Z"}, {"uuid": "5c478cb2-d112-4002-a865-fb18560694fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43990", "type": "seen", "source": "https://t.me/ctinow/174615", "content": "https://ift.tt/xIZGjHb\nCVE-2023-43990 Exploit", "creation_timestamp": "2024-01-27T04:16:18.000000Z"}, {"uuid": "6603e6d3-fa69-4296-a364-84b5880cf48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43991", "type": "seen", "source": "https://t.me/ctinow/174614", "content": "https://ift.tt/1zeCyMk\nCVE-2023-43991 Exploit", "creation_timestamp": "2024-01-27T04:16:17.000000Z"}, {"uuid": "3a184b43-025a-4a58-bea7-eb8e884ea9d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43995", "type": "seen", "source": "https://t.me/ctinow/174610", "content": "https://ift.tt/XfhoFdv\nCVE-2023-43995 Exploit", "creation_timestamp": "2024-01-27T04:16:12.000000Z"}, {"uuid": "27562e85-9f05-4991-8fc4-0b985a18fe10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43996", "type": "seen", "source": "https://t.me/ctinow/174609", "content": "https://ift.tt/pUYPDaF\nCVE-2023-43996 Exploit", "creation_timestamp": "2024-01-27T04:16:11.000000Z"}, {"uuid": "258211a1-79d5-4174-81e4-76bddf18f10d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43997", "type": "seen", "source": "https://t.me/ctinow/174608", "content": "https://ift.tt/Y3uyiBm\nCVE-2023-43997 Exploit", "creation_timestamp": "2024-01-27T04:16:10.000000Z"}, {"uuid": "2aa7f393-0a53-4f02-bd8a-14b0bd925426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43993", "type": "seen", "source": "https://t.me/ctinow/174612", "content": "https://ift.tt/EPIzZNe\nCVE-2023-43993 Exploit", "creation_timestamp": "2024-01-27T04:16:14.000000Z"}, {"uuid": "e792457d-81d4-4938-9e19-29cfbb59662f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "seen", "source": "https://t.me/ctinow/174611", "content": "https://ift.tt/qnephJY\nCVE-2023-43994 Exploit", "creation_timestamp": "2024-01-27T04:16:13.000000Z"}, {"uuid": "73b3e445-a3d0-4a29-9ca8-bf9e8df26a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43992", "type": "seen", "source": "https://t.me/ctinow/174613", "content": "https://ift.tt/Nqae8r2\nCVE-2023-43992 Exploit", "creation_timestamp": "2024-01-27T04:16:15.000000Z"}, {"uuid": "c2455fed-a708-4ef3-9ec1-9c03e0d647e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43995", "type": "seen", "source": "https://t.me/ctinow/172679", "content": "https://ift.tt/sgjAbXu\nCVE-2023-43995", "creation_timestamp": "2024-01-24T11:26:16.000000Z"}, {"uuid": "477de63c-592d-4cec-ba61-42e863cdff45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43994", "type": "seen", "source": "https://t.me/ctinow/172678", "content": "https://ift.tt/RpYHQyq\nCVE-2023-43994", "creation_timestamp": "2024-01-24T11:26:15.000000Z"}, {"uuid": "100c1a8b-e388-4091-9155-106b515a2e4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43993", "type": "seen", "source": "https://t.me/ctinow/172677", "content": "https://ift.tt/oFPNUdp\nCVE-2023-43993", "creation_timestamp": "2024-01-24T11:26:14.000000Z"}, {"uuid": "99687b93-cc20-4a60-9d36-a1b33c35da9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43992", "type": "seen", "source": "https://t.me/ctinow/172676", "content": "https://ift.tt/BOiuqRr\nCVE-2023-43992", "creation_timestamp": "2024-01-24T11:26:13.000000Z"}, {"uuid": "aa4fe86a-4a61-4f27-8b6e-99056476cf07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43991", "type": "seen", "source": "https://t.me/ctinow/172675", "content": "https://ift.tt/Xd4WAUz\nCVE-2023-43991", "creation_timestamp": "2024-01-24T11:26:12.000000Z"}, {"uuid": "e4748a64-38de-4ff7-9bff-5ac1f72e55d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43990", "type": "seen", "source": "https://t.me/ctinow/172674", "content": "https://ift.tt/r6zIjQU\nCVE-2023-43990", "creation_timestamp": "2024-01-24T11:26:11.000000Z"}, {"uuid": "5fcf621c-9204-4e9e-93df-9f081fdbb7e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43999", "type": "seen", "source": "https://t.me/ctinow/172683", "content": "https://ift.tt/9HPqy2h\nCVE-2023-43999", "creation_timestamp": "2024-01-24T11:26:21.000000Z"}, {"uuid": "06e6e37e-b086-4bce-913c-e890b9fc49a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43998", "type": "seen", "source": "https://t.me/ctinow/172682", "content": "https://ift.tt/dhpf1zg\nCVE-2023-43998", "creation_timestamp": "2024-01-24T11:26:19.000000Z"}, {"uuid": "208a4ee0-506f-451a-9021-2e7dc2f2ef29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43997", "type": "seen", "source": "https://t.me/ctinow/172681", "content": "https://ift.tt/0bWdBEA\nCVE-2023-43997", "creation_timestamp": "2024-01-24T11:26:18.000000Z"}, {"uuid": "7d30f05c-fc5b-49d0-bc9c-7a1aeeeaf0f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43996", "type": "seen", "source": "https://t.me/ctinow/172680", "content": "https://ift.tt/oJ17gCj\nCVE-2023-43996", "creation_timestamp": "2024-01-24T11:26:17.000000Z"}]}