{"vulnerability": "CVE-2023-6548", "sightings": [{"uuid": "57863d42-bb5b-49f6-b52d-33f620fb4cdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://t.me/HackingInsights/6757", "content": "\u200aNHS England Issues Cyber Alert for Exploited CVE-2023-6548 Vulnerability in NetScaler Devices\n\nhttps://securityonline.info/nhs-england-issues-cyber-alert-for-exploited-cve-2023-6548-vulnerability-in-netscaler-devices/", "creation_timestamp": "2024-07-20T15:40:04.000000Z"}, {"uuid": "5de19b24-86f3-48db-aa76-34d1eab49950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3147", "content": "More Zero-Days !!!\n\n\u2705 Citrix fixes critical RCE flaws (CVE-2023-6548, CVE-2023-6549) exploited in wild.\n\n\u2705 VMware Aria Automation bug (CVE-2023-34063) allows attacker control.\n\n\u2705 Atlassian issues fixes for 24+ flaws, including RCE.\n\nPatch, Update ASAP: https://thehackernews.com/2024/01/citrix-vmware-and-atlassian-hit-with.html", "creation_timestamp": "2024-01-17T10:06:28.000000Z"}, {"uuid": "13bf7b11-c5c0-4a9d-8c02-a5d954f919ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "Telegram/JiTroE_o33lWWkvgdwMzlaTnF4xjfMEwJdtiFfjCCuvaYg", "content": "", "creation_timestamp": "2024-01-17T06:20:00.000000Z"}, {"uuid": "d78369ab-c5b0-49e3-ae75-2747f0d04687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/287", "content": "More Zero-Days !!!\n\n\u2705 Citrix fixes critical RCE flaws (CVE-2023-6548, CVE-2023-6549) exploited in wild.\n\n\u2705 VMware Aria Automation bug (CVE-2023-34063) allows attacker control.\n\n\u2705 Atlassian issues fixes for 24+ flaws, including RCE.\n\nPatch, Update ASAP: https://thehackernews.com/2024/01/citrix-vmware-and-atlassian-hit-with.html", "creation_timestamp": "2024-01-17T10:06:28.000000Z"}, {"uuid": "7aff413b-5cb2-42d3-920a-0685e47f5070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://t.me/KomunitiSiber/1350", "content": "Citrix, VMware, and Atlassian Hit with Critical Flaws \u2014 Patch ASAP!\nhttps://thehackernews.com/2024/01/citrix-vmware-and-atlassian-hit-with.html\n\nCitrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) that are being actively exploited in the wild.\nThe flaws are listed below -\n\nCVE-2023-6548 (CVSS score: 5.5) - Authenticated (low privileged) remote code execution on Management Interface (requires access to NSIP, CLIP, or SNIP with management", "creation_timestamp": "2024-01-17T06:03:43.000000Z"}, {"uuid": "26dd95ce-3e7d-408a-901e-266f861aad2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/CyberSecurityIL/36628", "content": "\u05d0\u05e8\u05d1\u05e2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05de\u05d4\u05d9\u05de\u05de\u05d4 \u05d4\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e9\u05db\u05d3\u05d0\u05d9 \u05dc\u05e9\u05d9\u05dd \u05d0\u05dc\u05d9\u05d4\u05df \u05dc\u05d1:\n\n1. \u05d2\u05d9\u05d8\u05d4\u05d0\u05d1 \u05de\u05ea\u05e7\u05e0\u05ea \u05d7\u05d5\u05dc\u05e9\u05d4 \u05d1\u05e2\u05e7\u05d1\u05d5\u05ea\u05d9\u05d4 \u05d4\u05d9\u05d0 \u05d2\u05dd \u05de\u05d1\u05e6\u05e2\u05ea \u05d4\u05d7\u05dc\u05e4\u05d4 \u05dc\u05de\u05e4\u05ea\u05d7\u05d5\u05ea \u05e9\u05dc \u05d7\u05dc\u05e7 \u05de\u05d4\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9\u05dd. (CVE-2024-0200)\n\n2. \u05d7\u05d5\u05dc\u05e9\u05ea Zero-Day \u05d1\u05d3\u05e4\u05d3\u05e4\u05df \u05db\u05e8\u05d5\u05dd \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05f4 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd, \u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05de\u05ea\u05d5\u05e7\u05e0\u05d5\u05ea:\n- Windows - 120.0.6099.224/225\n- Mac -120.0.6099.234\n- Linux - 120.0.6099.224\n3. \u05e9\u05ea\u05d9 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea Zero-Day \u05d1-Citrix Netscaler ADC (\u05e9\u05d5\u05d1...) \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05e2\u05f4\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd (CVE-2023-6548, CVE-2023-6549)\n\nhttps://t.me/CyberSecurityIL/4448", "creation_timestamp": "2024-01-17T08:47:54.000000Z"}, {"uuid": "0f674b69-5229-49a4-b171-5289bd015546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/true_secator/5302", "content": "\u041d\u043e\u0432\u044b\u0439 \u0433\u043e\u0434 \u0434\u043b\u044f \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 Citrix, VMware \u0438 Atlassian \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0441 \u043d\u043e\u0432\u044b\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c.\n\nCitrix \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u0434\u0432\u0443\u0445 0-day \u0432 NetScaler ADC (\u0440\u0430\u043d\u0435\u0435 Citrix ADC) \u0438 NetScaler Gateway (\u0440\u0430\u043d\u0435\u0435 Citrix Gateway), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2023-6548\u00a0(CVSS: 5,5) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430 \u0441 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 (\u043d\u0438\u0437\u043a\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438) \u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f (\u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0434\u043e\u0441\u0442\u0443\u043f \u043a NSIP, CLIP \u0438\u043b\u0438 SNIP \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f).\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2023-6549\u00a0(\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8,2) \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, \u043d\u043e \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0431\u044b\u043b\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043e \u043a\u0430\u043a \u0448\u043b\u044e\u0437 \u0438\u043b\u0438 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0443\u0447\u0435\u0442\u0430 \u0438\u043b\u0438 AAA.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u0438\u0445 CVE \u043d\u0430 \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044f \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c NetScaler ADC \u0438 NetScaler Gateway \u0432\u0435\u0440\u0441\u0438\u0438 12.1 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442.\n\nVMware \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 Aria Automation (\u0440\u0430\u043d\u0435\u0435 vRealize Automation), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f.\n\nCVE-2023-34063\u00a0\u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS: 9,9, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 CSIRO.\n\n\u041e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 VMware Aria Automation (8.11.x, 8.12.x, 8.13.x \u0438 8.14.x) \u0438 VMware Cloud Foundation (4.x \u0438 5.x).\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442 VMware, \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0441\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430 - \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e 8.16.\n\nAtlassian \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c\u00a0\u0434\u0432\u0443\u0445 \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 RCE-\u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0448\u0430\u0431\u043b\u043e\u043d\u0430, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Confluence Data Center and Server.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00a0CVE-2023-22527\u00a0\u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 CVSS 10,0, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0434\u043b\u044f \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f.\n\n\u041e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 8.0.x, 8.1.x, 8.2.x, 8.3.x, 8.4.x \u0438 8.5.0\u20138.5.3, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435 \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u0438 7.19.x LTS.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0440\u0435\u0448\u0435\u043d\u0430\u00a0\u0432\u00a08.5.4, 8.5.5 (Confluence Data Center and Server), 8.6.0, 8.7.1 \u0438 8.7.2 (Confluence Data Center).\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438.", "creation_timestamp": "2024-01-17T15:10:06.000000Z"}, {"uuid": "b7be804a-4d96-42a1-80ea-c8e16deced91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/ctinow/169216", "content": "https://ift.tt/2g4IUCA\nCVE-2023-6548 Exploitation", "creation_timestamp": "2024-01-17T11:16:38.000000Z"}, {"uuid": "1f61035b-b16d-47a5-985f-af1a7141a882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://t.me/ctinow/169472", "content": "https://ift.tt/dwV5JSR\nCVE-2023-6548", "creation_timestamp": "2024-01-17T21:31:49.000000Z"}, {"uuid": "3153923d-71fc-4cdd-a5cf-15b2ff07c426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://t.me/information_security_channel/51342", "content": "Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation\nhttps://www.securityweek.com/citrix-warns-netscaler-adc-customers-of-new-zero-day-exploitation/\n\nCitrix is aware of attacks exploiting two new NetScaler ADC and Gateway zero-day vulnerabilities tracked as CVE-2023-6548 and CVE-2023-6549.\nThe post Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation (https://www.securityweek.com/citrix-warns-netscaler-adc-customers-of-new-zero-day-exploitation/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-01-17T12:48:10.000000Z"}, {"uuid": "89ce9b05-8e7a-4b39-84d6-19a540361106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://t.me/thehackernews/4412", "content": "More Zero-Days !!!\n\n\u2705 Citrix fixes critical RCE flaws (CVE-2023-6548, CVE-2023-6549) exploited in wild.\n\n\u2705 VMware Aria Automation bug (CVE-2023-34063) allows attacker control.\n\n\u2705 Atlassian issues fixes for 24+ flaws, including RCE.\n\nPatch, Update ASAP: https://thehackernews.com/2024/01/citrix-vmware-and-atlassian-hit-with.html", "creation_timestamp": "2024-01-17T06:30:38.000000Z"}, {"uuid": "a7d5f41f-6f4e-409e-bf55-4b5e0e2d7f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:51.000000Z"}, {"uuid": "506f0ae5-7f96-4260-a2d9-8a759333c319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/80c176d4-1003-4516-8d2a-a5970fd9136b", "content": "", "creation_timestamp": "2026-02-02T12:26:42.725213Z"}, {"uuid": "087c3fe6-9da1-42ad-b283-aac21b69cc84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-01-17T18:10:02.000000Z"}, {"uuid": "fafac7d9-d30e-46d7-840d-b5c88f238d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10095", "content": "#exploit\n1. CVE-2024-0519:\nOut-of-bounds memory access vulnerability\nin V8 JavaScript/WebAssembly engines\nhttps://github.com/JohnHormond/CVE-2024-0519-Chrome-exploit\n\n2. CVE-2023-6548:\n0-day for Citrix Netscaler ADC/Gateway latest versions\nhttps://github.com/Roonye660/CVE-2023-6548-POC\n\n3. Whaticket Websocket Exploit\nhttps://github.com/allgood/WhaticketWebsocketExploit", "creation_timestamp": "2024-03-05T17:55:42.000000Z"}, {"uuid": "dab83b3a-9a3a-48b2-a76d-818f3850a89b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/80c176d4-1003-4516-8d2a-a5970fd9136b", "content": "", "creation_timestamp": "2026-02-02T12:26:42.725213Z"}, {"uuid": "a0cb1f6e-5a4c-4de7-9414-03965cd1969e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1203", "content": "", "creation_timestamp": "2024-01-17T04:00:00.000000Z"}, {"uuid": "0378c8a8-273d-47e9-bdd8-ec59a7af0148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6548", "type": "seen", "source": "https://vulnerability.circl.lu/comment/dde1219a-14e2-47e0-9be7-64b42823c889", "content": "", "creation_timestamp": "2024-07-17T15:49:25.225853Z"}]}