{"vulnerability": "CVE-2023-49250", "sightings": [{"uuid": "687c1bf5-3993-48cc-bbdd-e5e7146a19a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49250", "type": "seen", "source": "https://t.me/ctinow/188361", "content": "https://ift.tt/U8jJVvq\nCVE-2023-49250", "creation_timestamp": "2024-02-20T11:26:26.000000Z"}, {"uuid": "029501b7-c4fd-4fa2-9931-37f81bbdf492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49250", "type": "seen", "source": "https://t.me/arpsyndicate/3735", "content": "#ExploitObserverAlert\n\nCVE-2023-49250\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-49250. Because the HttpUtils class did not verify certificates, an attacker that could perform a Man-in-the-Middle (MITM) attack on outgoing https connections could impersonate the server.  This issue affects Apache DolphinScheduler: before 3.2.0.  Users are recommended to upgrade to version 3.2.1, which fixes the issue.", "creation_timestamp": "2024-02-21T07:38:10.000000Z"}, {"uuid": "ecb4a06b-a80e-430f-b1fc-fac36e913eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49250", "type": "seen", "source": "https://t.me/ctinow/188368", "content": "https://ift.tt/U8jJVvq\nCVE-2023-49250", "creation_timestamp": "2024-02-20T11:31:53.000000Z"}]}