{"vulnerability": "CVE-2023-50246", "sightings": [{"uuid": "4118e9ca-f0b1-4d03-bf9b-463521813631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50246", "type": "seen", "source": "https://t.me/ctinow/156277", "content": "https://ift.tt/Q7WiOyV\nCVE-2023-50246 Exploit", "creation_timestamp": "2023-12-19T08:17:52.000000Z"}, {"uuid": "f65d04f3-0720-4006-ad5e-1de4cda4d272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50246", "type": "seen", "source": "https://t.me/arpsyndicate/4560", "content": "#ExploitObserverAlert\n\nCVE-2023-50246\n\nDESCRIPTION: Exploit Observer has 11 entries in 3 file formats related to CVE-2023-50246. jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5960356", "creation_timestamp": "2024-04-12T08:09:11.000000Z"}, {"uuid": "f142dcf7-a1a9-46f5-a012-7b97a8467770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50246", "type": "seen", "source": "https://t.me/ctinow/165827", "content": "https://ift.tt/3zTxGn2\nCVE-2023-50246 | jq 1.7 buffer overflow (GHSA-686w-5m7m-54vc)", "creation_timestamp": "2024-01-10T14:36:42.000000Z"}]}