{"uuid": "bc0e2e2e-b39f-48d8-b396-bd2b5b448b61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32771", "type": "seen", "source": "https://t.me/cvedetector/4987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32771 - QNAP QuTS QTS Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-32771 \nPublished : Sept. 6, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : An improper restriction of excessive authentication attempts vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network authenticated administrators to perform an arbitrary number of authentication attempts via unspecified vectors.  \nQuTScloud is not affected.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.2.0.2782 build 20240601 and later  \nQuTS hero h5.2.0.2782 build 20240601 and later \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:56:56.000000Z"}