{"vulnerability": "CVE-2023-50268", "sightings": [{"uuid": "417078b5-cc83-4962-99d6-d63598531c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50268", "type": "seen", "source": "https://bsky.app/profile/novafacing.bsky.social/post/3m4ggypx7522d", "content": "", "creation_timestamp": "2025-10-30T17:04:18.388313Z"}, {"uuid": "4d101c0b-e004-44a4-8ce6-e44e07516a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50268", "type": "seen", "source": "https://t.me/ctinow/156278", "content": "https://ift.tt/preWEcD\nCVE-2023-50268 Exploit", "creation_timestamp": "2023-12-19T08:17:54.000000Z"}, {"uuid": "32563292-1daf-47a2-88f8-c7bdd50ae71c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50268", "type": "seen", "source": "https://t.me/arpsyndicate/4593", "content": "#ExploitObserverAlert\n\nCVE-2023-50268\n\nDESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2023-50268. jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5959611", "creation_timestamp": "2024-04-12T10:42:47.000000Z"}, {"uuid": "52515f42-f3d3-48d4-80be-0f07f3c26811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50268", "type": "seen", "source": "https://t.me/ctinow/165826", "content": "https://ift.tt/b1G7VXB\nCVE-2023-50268 | jq = 1.7 decNumber buffer overflow (GHSA-7hmr-442f-qc8j)", "creation_timestamp": "2024-01-10T14:36:41.000000Z"}]}