{"vulnerability": "CVE-2023-5035", "sightings": [{"uuid": "a775017e-8835-4b14-91ab-695e2baef600", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "611c1f42-86c2-42c0-9cd4-7ca13eb55a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "fd4cf2c1-f5cc-4df4-b7e7-2477e5bc7bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5035", "type": "seen", "source": "https://t.me/cibsecurity/73462", "content": "\u203c CVE-2023-5035 \u203c\n\nA vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-02T19:48:52.000000Z"}, {"uuid": "160e9fb8-8d3d-43b6-accd-edcf75f8aaf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6765", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aExploit CVE-2023-45318-POC  Weston Embedded uC-HTTP git commit 80d4004 ---&gt; RCE\nURL\uff1ahttps://github.com/greandfather/CVE-2023-50358-POC-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-03-08T21:25:01.000000Z"}, {"uuid": "482310d8-b8e4-4dee-968e-ec1f2abb7f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50355", "type": "seen", "source": "https://t.me/cvedetector/8773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-50355 - HCL Sametime Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-50355 \nPublished : Oct. 23, 2024, 11:15 p.m. | 22\u00a0minutes ago \nDescription : HCL Sametime is impacted by the error messages containing sensitive information.  An attacker can use this information to launch another, more focused attack. \nSeverity: 3.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T01:46:01.000000Z"}, {"uuid": "6dd1ee85-86c9-42aa-8ef4-e297d4ed819d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15812", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50358\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.5.2645 build 20240116 and later\nQTS 4.5.4.2627 build 20231225 and later\nQTS 4.3.6.2665 build 20240131 and later\nQTS 4.3.4.2675 build 20240131 and later\nQTS 4.3.3.2644 build 20240131 and later\nQTS 4.2.6 build 20240131 and later\nQuTS hero h5.1.5.2647 build 20240118 and later\nQuTS hero h4.5.4.2626 build 20231225 and later\nQuTScloud c5.1.5.2651 and later\n\ud83d\udccf Published: 2024-02-13T02:45:22.351Z\n\ud83d\udccf Modified: 2025-05-09T18:16:31.828Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-23-57\n2. https://unit42.paloaltonetworks.com/qnap-qts-firmware-cve-2023-50358/\n3. https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032", "creation_timestamp": "2025-05-09T18:26:26.000000Z"}, {"uuid": "39df28f0-e184-4ffd-8ef8-cd7b8491516b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/cibsecurity/74266", "content": "\u203c\ufe0fCVE-2023-50351\u203c\ufe0f\n\nHCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:31:25.000000Z"}, {"uuid": "14058fba-4d37-44a9-b9c0-ba4eafb31f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50350", "type": "seen", "source": "https://t.me/cibsecurity/74265", "content": "\u203c\ufe0fCVE-2023-50350\u203c\ufe0f\n\nHCL DRYiCE MyXalytics is impacted by the use of a broken cryptographic algorithm for encryption, potentially giving an attacker ability to decrypt sensitive information.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:31:20.000000Z"}, {"uuid": "958e20f7-5f18-44e5-8bda-544c8cbeb267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "seen", "source": "https://t.me/ctinow/203119", "content": "https://ift.tt/k9PBRxQ\nCVE-2023-50358 Exploit", "creation_timestamp": "2024-03-08T08:16:55.000000Z"}, {"uuid": "af2e0ed4-5b71-4bd4-9ccb-5bb9877da849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "seen", "source": "https://t.me/ctinow/184575", "content": "https://ift.tt/quJsGH4\nQNAP fixes OS command injection flaws affecting its NAS devices (CVE-2023-47218, CVE-2023-50358)", "creation_timestamp": "2024-02-14T12:16:32.000000Z"}, {"uuid": "746f075a-8f0d-4ad4-aa65-b59a1ab6a84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/ctinow/171940", "content": "https://ift.tt/KJU7xXh\nCVE-2023-50351 | HCL DRYiCE MyXalytics 5.9/6.0/6.1 Key Rotation cryptographic issues (KB0109608)", "creation_timestamp": "2024-01-23T13:31:48.000000Z"}, {"uuid": "37a38ebd-0072-47e7-b3cb-c422c6a06dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50350", "type": "seen", "source": "https://t.me/ctinow/171921", "content": "https://ift.tt/PdYi89k\nCVE-2023-50350 | HCL DRYiCE MyXalytics 5.9/6.0/6.1 cryptographic issues (KB0109608)", "creation_timestamp": "2024-01-23T12:51:48.000000Z"}, {"uuid": "9c16d715-d17b-400a-b7b1-2a05a83a1536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/ctinow/162166", "content": "https://ift.tt/4ivBNpl\nCVE-2023-50351", "creation_timestamp": "2024-01-03T03:26:34.000000Z"}, {"uuid": "80f53278-796c-4009-9a1b-a4cd444a480a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50350", "type": "seen", "source": "https://t.me/ctinow/162165", "content": "https://ift.tt/x0sI2NB\nCVE-2023-50350", "creation_timestamp": "2024-01-03T03:26:33.000000Z"}, {"uuid": "4e2ace27-ac64-4b4e-ac03-31df332da264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "exploited", "source": "https://t.me/true_secator/5413", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Unit 42 \u0438\u0437 Palo Alto Networks \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043d\u043e\u0432\u043e\u043c 0-day \u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 NAS \u0442\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u043e\u0439 QNAP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0441 \u043d\u043e\u044f\u0431\u0440\u044f \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2023-50358 \u0438 \u0432\u043b\u0438\u044f\u0435\u0442 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u00a0Quick.cgi \u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0441 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c \u041f\u041e QTS \u0438 QuTS Hero, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u043c\u0443 \u0432\u043e\u0437\u043c\u043e\u0436\u0435\u043d \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u041f\u0440\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430\u00a0todo=set_timeinfo\u00a0\u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a \u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u0432\u00a0\u0444\u0430\u0439\u043b\u0435 fast.cgi\u00a0\u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u00a0SPECIFIC_SERVER\u00a0\u0432 \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438\u00a0/tmp/quick/quick_tmp.conf\u00a0\u0441 \u0438\u043c\u0435\u043d\u0435\u043c \u0437\u0430\u043f\u0438\u0441\u0438\u00a0NTP Address.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0430\u0434\u0440\u0435\u0441\u0430 NTP-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u044e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0443\u0442\u0438\u043b\u0438\u0442\u044b\u00a0ntpdate.\n\n\u0412\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u0437 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0443\u0442\u0435\u043c \u0447\u0442\u0435\u043d\u0438\u044f\u00a0\u0430\u0434\u0440\u0435\u0441\u0430 NTP\u00a0\u0432\u00a0\u0444\u0430\u0439\u043b\u0435 fast_tmp.conf, \u0430 \u0437\u0430\u0442\u0435\u043c \u044d\u0442\u0430 \u0441\u0442\u0440\u043e\u043a\u0430 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e\u00a0system().\n\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u00a0SPECIFIC_SERVER\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c\u0441\u044f \u0432 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0435, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e 7 \u043d\u043e\u044f\u0431\u0440\u044f 2023 \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u043b\u0438\u0441\u044c \u0441 \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0442\u0440\u0430\u0444\u0438\u043a\u043e\u043c \u0441 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0430\u043c\u0438 \u0430\u0442\u0430\u043a \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 QNAP.\n\n\u0414\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0432\u044b\u044f\u0432\u0438\u043b \u043d\u043e\u0432\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e \u0447\u0435\u043c 21 \u043d\u043e\u044f\u0431\u0440\u044f \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 19 \u0434\u0435\u043a\u0430\u0431\u0440\u044f.\n\n\u041f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e QNAP \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u043c\u0438 \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043f\u043e \u043d\u043e\u0432\u043e\u0439 0-day. \n\n\u0422\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f Palo Alto Networks \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 \u044f\u043d\u0432\u0430\u0440\u044c 2024 \u0433\u043e\u0434\u0430 289 665 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u0438\u0437 18 \u0441\u0442\u0440\u0430\u043d \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438 NAS.\n\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0447\u0435\u043c, \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430\u043c NAS \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c QTS \u0438\u043b\u0438 QuTScloud Hero \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u0422\u0430\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 IoT, \u0441\u043e\u0447\u0435\u0442\u0430\u044e\u0442 \u0432 \u0441\u0435\u0431\u0435 \u043d\u0438\u0437\u043a\u0443\u044e \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0438\u0445 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043c\u0438\u0448\u0435\u043d\u044c\u044e \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432, \u043a\u0430\u043a \u044d\u0442\u043e \u043d\u0435\u043e\u0434\u043d\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u044b QNAP \u0432 \u0445\u043e\u0440\u0434\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e\u0434\u043d\u0438\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u0441 ransomware.", "creation_timestamp": "2024-02-14T12:20:05.000000Z"}, {"uuid": "efa6ab39-72fa-4e23-b137-ef5d04b4cf91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50359", "type": "seen", "source": "https://t.me/ctinow/192821", "content": "https://ift.tt/eqdMzHO\nCVE-2023-50359 | QNAP Systems QTS/QuTS hero return value (qsa-24-07)", "creation_timestamp": "2024-02-25T10:41:36.000000Z"}, {"uuid": "d866c400-6a2c-4cc3-a70b-3327397b1af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50358", "type": "seen", "source": "https://t.me/ctinow/183591", "content": "https://ift.tt/EAWnpPv\nCVE-2023-50358", "creation_timestamp": "2024-02-13T04:31:44.000000Z"}, {"uuid": "00d43bf2-0447-414b-b9bf-1936b591d4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50357", "type": "seen", "source": "https://t.me/ctinow/176688", "content": "https://ift.tt/28zFZxE\nCVE-2023-50357", "creation_timestamp": "2024-01-31T12:26:35.000000Z"}, {"uuid": "95d4add2-36b4-4d3c-b5e1-51f59d6a6e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50356", "type": "seen", "source": "https://t.me/ctinow/176687", "content": "https://ift.tt/G16w0XL\nCVE-2023-50356", "creation_timestamp": "2024-01-31T12:26:34.000000Z"}]}