{"vulnerability": "CVE-2023-50270", "sightings": [{"uuid": "8a467c02-9221-481a-bd8e-3f9f20d7782d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50270", "type": "seen", "source": "https://t.me/ctinow/188362", "content": "https://ift.tt/QNauvjE\nCVE-2023-50270", "creation_timestamp": "2024-02-20T11:26:27.000000Z"}, {"uuid": "bdad8969-5140-4d4c-9d49-2cf69fcf5809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50270", "type": "seen", "source": "https://t.me/arpsyndicate/3738", "content": "#ExploitObserverAlert\n\nCVE-2023-50270\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-50270. Session Fixation Apache DolphinScheduler before version 3.2.0, which session is still valid after the password change.  Users are recommended to upgrade to version 3.2.1, which fixes this issue.", "creation_timestamp": "2024-02-21T07:40:58.000000Z"}, {"uuid": "c9ba870a-ef3a-4130-b0f4-ced9523c9168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50270", "type": "seen", "source": "https://t.me/ctinow/188369", "content": "https://ift.tt/QNauvjE\nCVE-2023-50270", "creation_timestamp": "2024-02-20T11:31:54.000000Z"}]}