{"vulnerability": "CVE-2023-50966", "sightings": [{"uuid": "d73cbf14-12a3-4aeb-a6fe-7e2060acb1db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50966", "type": "seen", "source": "https://t.me/arpsyndicate/4588", "content": "#ExploitObserverAlert\n\nCVE-2023-50966\n\nDESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to CVE-2023-50966. erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.\n\nFIRST-EPSS: 0.000450000\nARPS-EXPLOITABILITY: 0.6065053", "creation_timestamp": "2024-04-12T10:19:55.000000Z"}, {"uuid": "95284979-f229-438e-9893-8a161b162b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50966", "type": "seen", "source": "https://t.me/ctinow/211681", "content": "https://ift.tt/E1karJ7\nCVE-2023-50966", "creation_timestamp": "2024-03-19T16:26:33.000000Z"}, {"uuid": "14729c60-4dea-4718-989a-5e7ac577bb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50966", "type": "seen", "source": "https://t.me/ctinow/211750", "content": "https://ift.tt/5PuFW97\nCVE-2023-50966", "creation_timestamp": "2024-03-19T17:41:22.000000Z"}]}