{"vulnerability": "CVE-2023-2460", "sightings": [{"uuid": "2b6106a3-129e-4630-af61-134463049221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24609", "type": "seen", "source": "https://t.me/ctinow/158190", "content": "https://ift.tt/dpw7mMC\nCVE-2023-24609", "creation_timestamp": "2023-12-22T05:31:58.000000Z"}, {"uuid": "ec547c03-62fe-44e8-9f1e-c393e77a1e68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24607", "type": "seen", "source": "https://gist.github.com/Darkcrai86/db9b6665c56b50a69b4fc1f0e15c6d63", "content": "", "creation_timestamp": "2025-09-29T07:58:15.000000Z"}, {"uuid": "18bfdbba-803b-44c8-8bb1-b8923567c36a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24607", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}, {"uuid": "874b1cae-3f5c-4e4b-ad15-12c98f30f90e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24609", "type": "seen", "source": "https://t.me/ctinow/162657", "content": "https://ift.tt/Nqea8wI\nCVE-2023-24609 Exploit", "creation_timestamp": "2024-01-03T23:17:20.000000Z"}, {"uuid": "bcf9f436-7820-4e5d-81c7-b49491394228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2460", "type": "seen", "source": "https://t.me/cibsecurity/63198", "content": "\u203c CVE-2023-2460 \u203c\n\nInsufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-03T07:30:50.000000Z"}, {"uuid": "bf033a34-7306-4efe-8ba3-898324fc89df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24607", "type": "seen", "source": "https://t.me/cibsecurity/62214", "content": "\u203c CVE-2023-24607 \u203c\n\nQt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-15T07:26:35.000000Z"}]}