{"vulnerability": "CVE-2023-6184", "sightings": [{"uuid": "76edfdc5-cce3-4340-93e4-27e3a8244e1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6184", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "daf24c2f-6526-4755-b82f-c89b594add28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6184", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lugeqfcvo222", "content": "", "creation_timestamp": "2025-07-20T21:02:22.897573Z"}, {"uuid": "d00aed70-d91e-4fd3-82e1-b2d4043d3e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6184", "type": "seen", "source": "https://t.me/ctinow/179836", "content": "https://ift.tt/5STUtva\nCVE-2023-6184 | Citrix Virtual Apps and Desktops Session Recording dynamically-managed code resources (CTX583930)", "creation_timestamp": "2024-02-06T08:41:19.000000Z"}, {"uuid": "a59030af-8073-41f0-b3f7-bb9af0f48e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6184", "type": "seen", "source": "https://t.me/CNArsenal/2127", "content": "https://www.assetnote.io/resources/research/continuing-the-citrix-saga-cve-2023-5914-cve-2023-6184\n#\u5206\u6790", "creation_timestamp": "2024-03-16T08:53:38.000000Z"}, {"uuid": "65bb4fd7-be03-4628-aaba-7cfd1b0cca72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6184", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10158", "content": "#Threat_Research\n1. Reply to calc: The Attack Chain to Compromise Mailspring\nhttps://www.sonarsource.com/blog/reply-to-calc-the-attack-chain-to-compromise-mailspring\n2. Citrix application vulnerabilities:\nCVE-2023-5914, CVE-2023-6184\nhttps://www.assetnote.io/resources/research/continuing-the-citrix-saga-cve-2023-5914-cve-2023-6184\n3. Local Volumes Vulnerability in Kubernetes\nhttps://www.akamai.com/blog/security-research/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges", "creation_timestamp": "2024-03-16T19:41:57.000000Z"}]}