{"vulnerability": "cve-2024-5369", "sightings": [{"uuid": "537db86b-2153-4b95-a20f-af5eeedc500f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53693", "type": "seen", "source": "https://t.me/cvedetector/19850", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53693 - QNAP QTS/QuTS hero CRLF Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53693 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.3.3006 build 20250108 and later  \nQuTS hero h5.2.3.3006 build 20250108 and later \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:48:06.000000Z"}, {"uuid": "99a6f7ee-7a9d-45a8-b140-feef65a4888d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53692", "type": "seen", "source": "https://t.me/cvedetector/19849", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53692 - QNAP QTS/QuTS Hero Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53692 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.3.3006 build 20250108 and later  \nQuTS hero h5.2.3.3006 build 20250108 and later \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:48:05.000000Z"}, {"uuid": "8eaa67df-fea5-420a-9a59-1159869e70d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53699", "type": "seen", "source": "https://t.me/cvedetector/19846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53699 - QNAP QTS/QuTS hero Out-of-Bounds Write Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-53699 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.3.3006 build 20250108 and later  \nQuTS hero h5.2.3.3006 build 20250108 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:59.000000Z"}, {"uuid": "107d95bf-054b-45a5-b64c-f860fa0603db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2872", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53691\n\ud83d\udd39 Description: A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later\n\ud83d\udccf Published: 2024-12-06T16:34:54.018Z\n\ud83d\udccf Modified: 2025-01-24T04:55:42.067Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-28", "creation_timestamp": "2025-01-24T05:03:34.000000Z"}, {"uuid": "f1df358b-0b5b-4ec4-8a64-9ce1433b8394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53693", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6859", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53693\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later\n\ud83d\udccf Published: 2025-03-07T16:13:29.581Z\n\ud83d\udccf Modified: 2025-03-07T16:13:29.581Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-54", "creation_timestamp": "2025-03-07T16:35:30.000000Z"}, {"uuid": "0cfd903c-76e9-4c87-9f8f-41838d651f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53694", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6858", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53694\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources.\n\nWe have already fixed the vulnerability in the following versions:\nQVPN Device Client for Mac 2.2.5 and later\nQsync for Mac 5.1.3 and later\nQfinder Pro Mac 7.11.1 and later\n\ud83d\udccf Published: 2025-03-07T16:13:36.014Z\n\ud83d\udccf Modified: 2025-03-07T16:13:36.014Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-51", "creation_timestamp": "2025-03-07T16:35:29.000000Z"}, {"uuid": "3490b5a4-9e54-4932-b116-2efd7f6b5cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53695", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6857", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53695\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A buffer overflow vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nHBS 3 Hybrid Backup Sync 25.1.4.952 and later\n\ud83d\udccf Published: 2025-03-07T16:13:42.883Z\n\ud83d\udccf Modified: 2025-03-07T16:13:42.883Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-25-06", "creation_timestamp": "2025-03-07T16:35:28.000000Z"}, {"uuid": "32790946-dfb0-4914-99f2-2169ecbc929b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53696\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.7.0.829 ( 2024/10/01 ) and later\nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later\nQTS 4.5.4.2957 build 20241119 and later\nQuTS hero h4.5.4.2956 build 20241119 and later\n\ud83d\udccf Published: 2025-03-07T16:13:55.595Z\n\ud83d\udccf Modified: 2025-03-07T16:13:55.595Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-53", "creation_timestamp": "2025-03-07T16:35:27.000000Z"}, {"uuid": "0bd32ad4-4082-4076-b3af-627c0653110d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53697", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6855", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53697\n\ud83d\udd25 CVSS Score: 2.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later\n\ud83d\udccf Published: 2025-03-07T16:14:01.565Z\n\ud83d\udccf Modified: 2025-03-07T16:14:01.565Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-54", "creation_timestamp": "2025-03-07T16:35:27.000000Z"}, {"uuid": "44611e7c-aa8c-45d0-bcec-d2f8812cd562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6860", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53692\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later\n\ud83d\udccf Published: 2025-03-07T16:13:23.099Z\n\ud83d\udccf Modified: 2025-03-07T16:13:23.099Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-54", "creation_timestamp": "2025-03-07T16:35:31.000000Z"}, {"uuid": "64dcb420-98e5-4692-a9b7-500f113cdaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://t.me/cvedetector/12248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53691 - A link following vulnerability has been reported t\", \n  \"Content\": \"CVE ID : CVE-2024-53691 \nPublished : Dec. 6, 2024, 5:15 p.m. | 35\u00a0minutes ago \nDescription : A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.1.8.2823 build 20240712 and later  \nQTS 5.2.0.2802 build 20240620 and later  \nQuTS hero h5.1.8.2823 build 20240712 and later  \nQuTS hero h5.2.0.2802 build 20240620 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T18:58:13.000000Z"}, {"uuid": "923032a8-92be-465d-8267-484d0e043e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11684", "content": "#exploit\n1. CVE-2024-53691:\nQNAP QTS/QuTS RCE\nhttps://github.com/C411e/CVE-2024-53691\n\n2. CVE-2024-49848:\nQualcomm adsprpc driver bug\nhttps://project-zero.issues.chromium.org/issues/42451725", "creation_timestamp": "2025-01-20T12:38:51.000000Z"}, {"uuid": "6dbec5b4-d2c4-41a4-9cf9-e913c8d87d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113606912018934112", "content": "", "creation_timestamp": "2024-12-06T16:51:47.103000Z"}, {"uuid": "ceb06f72-9c02-4e77-823e-301abcd8c5b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113611087069960768", "content": "", "creation_timestamp": "2024-12-07T10:33:33.128984Z"}, {"uuid": "692d787e-51bd-4a45-ae54-47d6dc2a0a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/elhackernet.extwitter.link/post/3lg3klrxdd226", "content": "", "creation_timestamp": "2025-01-19T09:55:07.962813Z"}, {"uuid": "2dd9e9df-7142-400b-906a-493540550e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53698", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "7db8258a-71a6-4786-b1ac-9d9b6d2b883e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53694", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "561af57f-a637-4ce8-bea7-1a90f86e29b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53698", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:35.000000Z"}, {"uuid": "e7c29baa-4ae4-482c-8df8-777b801a2ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53694", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:35.000000Z"}, {"uuid": "509aea3a-0cb8-4cb5-a208-825ab0738602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53690", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs52mzoz22", "content": "", "creation_timestamp": "2025-01-11T13:16:48.612054Z"}, {"uuid": "5c570a97-2bd4-4ba3-ae71-c3a290e438c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lg5b6mmpzc2m", "content": "", "creation_timestamp": "2025-01-20T02:12:02.733635Z"}, {"uuid": "276da64c-3fbe-4d5f-81c0-4e53d34f0927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://threatintel.cc/2025/01/20/poc-exploit-released-for-qnap.html", "content": "", "creation_timestamp": "2025-01-20T11:30:26.000000Z"}, {"uuid": "51ea2170-0290-402f-b8d5-65968421dc3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lguxw5zqx72e", "content": "", "creation_timestamp": "2025-01-29T12:30:09.292161Z"}, {"uuid": "ad737ae2-ecfb-4394-95b9-2e90ee281bf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53698", "type": "seen", "source": "https://t.me/cvedetector/19845", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53698 - QNAP QTS/QuTS hero Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53698 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A double free vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify memory.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.3.3006 build 20250108 and later  \nQuTS hero h5.2.3.3006 build 20250108 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:59.000000Z"}, {"uuid": "01684c7c-ed76-4ed4-8798-2f0fd45c2f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53697", "type": "seen", "source": "https://t.me/cvedetector/19844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53697 - QNAP QTS/QuTS hero Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53697 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.3.3006 build 20250108 and later  \nQuTS hero h5.2.3.3006 build 20250108 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:58.000000Z"}, {"uuid": "25fb2fcd-0ad6-4b16-905c-7323e72bd01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53696", "type": "seen", "source": "https://t.me/cvedetector/19843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53696 - QuLog Center SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53696 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQuLog Center 1.7.0.829 ( 2024/10/01 ) and later  \nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later  \nQTS 4.5.4.2957 build 20241119 and later  \nQuTS hero h4.5.4.2956 build 20241119 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:57.000000Z"}, {"uuid": "072a52c8-1337-46fc-ae51-5528dec59fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53695", "type": "seen", "source": "https://t.me/cvedetector/19842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53695 - QNAP HBS 3 Hybrid Backup Sync Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-53695 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A buffer overflow vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to modify memory or crash processes.  \n  \nWe have already fixed the vulnerability in the following version:  \nHBS 3 Hybrid Backup Sync 25.1.4.952 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:53.000000Z"}, {"uuid": "497cd4b2-de6f-4bfe-8c34-9d6dece65273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53694", "type": "seen", "source": "https://t.me/cvedetector/19841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53694 - QNAP QVPN, Qsync, and Qfinder Pro TOCTOU Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53694 \nPublished : March 7, 2025, 5:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQVPN Device Client for Mac 2.2.5 and later  \nQsync for Mac 5.1.3 and later  \nQfinder Pro Mac 7.11.1 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T20:47:53.000000Z"}, {"uuid": "f699c341-777f-4048-a15e-98b9846b60e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53698", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6854", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53698\n\ud83d\udd25 CVSS Score: 2.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A double free vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later\n\ud83d\udccf Published: 2025-03-07T16:14:08.713Z\n\ud83d\udccf Modified: 2025-03-07T16:14:08.713Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-54", "creation_timestamp": "2025-03-07T16:35:25.000000Z"}, {"uuid": "a83a97b7-f7e9-4d17-98f1-72c6c817104a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53699", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6853", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53699\n\ud83d\udd25 CVSS Score: 2.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later\n\ud83d\udccf Published: 2025-03-07T16:14:15.735Z\n\ud83d\udccf Modified: 2025-03-07T16:14:15.735Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-54", "creation_timestamp": "2025-03-07T16:35:24.000000Z"}, {"uuid": "16bfc57b-d38a-448a-8f98-d4b50306c88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "Telegram/ycMWZ5EdqiWon2lWkuZzh1qRhqzOeYjmsdC2JSaGEmKWMXA", "content": "", "creation_timestamp": "2025-01-13T16:00:09.000000Z"}, {"uuid": "10d01350-4666-4eb9-b96f-b35367128500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/349", "content": "https://github.com/C411e/CVE-2024-53691\n\nCVE-2024-53691\n#github #exploit", "creation_timestamp": "2025-01-15T17:18:36.000000Z"}, {"uuid": "ae0d1a19-3f6b-4d45-9985-e7f029db9dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/431", "content": "https://github.com/C411e/CVE-2024-53691\n\nCVE-2024-53691\n#github #exploit", "creation_timestamp": "2025-01-15T17:26:46.000000Z"}, {"uuid": "716253e9-3534-4a45-8e34-6841d909bb1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfvvo5cqis2w", "content": "", "creation_timestamp": "2025-01-17T03:57:24.337797Z"}, {"uuid": "a0346afd-8374-4e52-97f5-3aa15c9213f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/netalexx.bsky.social/post/3lfvw3wbw4k2j", "content": "", "creation_timestamp": "2025-01-17T04:05:06.078646Z"}, {"uuid": "b7eab106-e1f2-4adf-a6ba-da549b634c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-53691", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfvwuek6ds2m", "content": "", "creation_timestamp": "2025-01-17T04:18:42.547355Z"}, {"uuid": "7a522f73-4058-4ba2-82ea-78b9823fe3fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfvzrdo7rt2x", "content": "", "creation_timestamp": "2025-01-17T05:10:41.967581Z"}, {"uuid": "86be0200-eb91-428b-81ee-f662e2aff803", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113844583737315788", "content": "", "creation_timestamp": "2025-01-17T16:14:49.648652Z"}]}