{"vulnerability": "CVE-2024-3276", "sightings": [{"uuid": "981d081e-ef89-4df6-a43c-791eebcb6052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32766", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7192", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1awriteup and PoC for CVE-2024-32766 (QNAP) OS command injection, chained attack for auth bypass.\nURL\uff1ahttps://github.com/p3c34r7/CVE-2024-32766-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-01T17:48:54.000000Z"}, {"uuid": "5d1c176a-94d2-4761-b579-eabd7e52b999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32766", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7199", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1awriteup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass\nURL\uff1ahttps://github.com/3W1nd4r/CVE-2024-32766-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-05-03T04:41:09.000000Z"}, {"uuid": "8c7ec683-8e60-4985-8e59-05f62f8caa44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32763", "type": "seen", "source": "https://t.me/cvedetector/4990", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32763 - QNAP QTS/QuTS hero Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-32763 \nPublished : Sept. 6, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.1.8.2823 build 20240712 and later  \nQuTS hero h5.1.8.2823 build 20240712 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:56:59.000000Z"}, {"uuid": "c927cd8b-7eae-4859-84ed-028c5b69891b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32762", "type": "seen", "source": "https://t.me/cvedetector/4989", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32762 - QuLog Center Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-32762 \nPublished : Sept. 6, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow users to inject malicious code via a network.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQuLog Center 1.8.0.872 ( 2024/06/17 ) and later  \nQuLog Center 1.7.0.827 ( 2024/06/17 ) and later \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:56:58.000000Z"}]}