{"vulnerability": "CVE-2023-4906", "sightings": [{"uuid": "583948e9-c937-4df4-9125-fe171e8d4a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49062", "type": "seen", "source": "https://t.me/ctinow/155665", "content": "https://ift.tt/2XoQ0uk\nCVE-2023-49062 | Facebook Katran IP Header bpf_xdp_adjust_head Identification initialization", "creation_timestamp": "2023-12-17T20:17:55.000000Z"}, {"uuid": "8762d4e6-1a8d-4469-8b28-94b49414de15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49068", "type": "seen", "source": "https://t.me/ctinow/155425", "content": "https://ift.tt/Imj9vB0\nCVE-2023-49068 | Apache DolphinScheduler up to 3.2.0 AbstractAuthenticator.java information disclosure", "creation_timestamp": "2023-12-16T15:17:58.000000Z"}, {"uuid": "d431c86c-247e-415f-ba1e-bc9e5ff01cc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4906", "type": "seen", "source": "https://t.me/cibsecurity/70361", "content": "\u203c CVE-2023-4906 \u203c\n\nInsufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T00:23:27.000000Z"}, {"uuid": "693133d1-5f48-4a9b-adf4-857c01458f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49068", "type": "seen", "source": "https://t.me/arpsyndicate/2420", "content": "#ExploitObserverAlert\n\nCVE-2023-49068\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-49068. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1.  Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.\n\nFIRST-EPSS: 0.000560000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-04T03:31:20.000000Z"}]}