{"uuid": "e18f2de0-dde6-440b-92bc-8a5d9a193809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40611", "type": "seen", "source": "https://t.me/arpsyndicate/831", "content": "#ExploitObserverAlert\n\nCVE-2023-47037\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47037. We failed to apply\u00a0CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.\u00a0  Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\u00a0  Users should upgrade to version 2.7.3 or later which has removed the vulnerability.\n\nFIRST-EPSS: 0.000710000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-12-01T06:46:53.000000Z"}