{"uuid": "052cc7ce-6f36-4505-afd2-62cc8e34e0b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-0708", "type": "seen", "source": "https://t.me/Teamx1945x/3641", "content": "\u0645\u0627 \u0627\u0644\u0645\u0642\u0635\u0648\u062f \u0628\u0640 Common Vulnerabilities and Exposures (CVE)\u061f \n\u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0648\u0627\u0644\u062a\u0639\u0631\u0636 \u0627\u0644\u0634\u0627\u0626\u0639\u0629\u060c \u0647\u064a \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u062a\u0636\u0645 \u062c\u0645\u064a\u0639 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0623\u0648 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0642\u0636\u0627\u064a\u0627 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646\u0647\u0627\u060c \u064a\u062d\u062f\u062f \u0631\u0642\u0645 \u0627\u0644\u0640 CVE \u062b\u063a\u0631\u0629 \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0627\u0644\u0642\u0627\u0626\u0645\u0629\u060c \u0648\u062a\u0648\u0641\u0631 \u0637\u0631\u064a\u0642\u0629 \u0645\u0644\u0627\u0626\u0645\u0629 \u0648\u0645\u0648\u062b\u0648\u0642\u0629 \u062c\u062f\u0627\u064b \u0644\u0623\u0635\u062d\u0627\u0628 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0648\u0627\u0644\u0623\u0643\u0627\u062f\u064a\u0645\u064a\u064a\u0646 \u0648\u0645\u0647\u0646\u062f\u0633\u064a\u0646 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0644\u062a\u0628\u0627\u062f\u0644 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648 \u0627\u0644\u062a\u0639\u0631\u0641 \u0639\u0644\u064a \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062c\u062f\u064a\u062f\u0629 \u062d\u0648\u0644 \u0642\u0636\u0627\u064a\u0627 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0641\u0639\u0627\u062f\u0629 \u0645\u0627 \u062a\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0634\u0631\u0643\u0627\u062a  \u0627\u0644\u0640 CVE \u0644\u0644\u062a\u062e\u0637\u064a\u0637 \u0648\u062a\u062d\u062f\u064a\u062f \u0627\u0644\u0623\u0648\u0644\u0648\u064a\u0627\u062a \u0641\u064a \u0628\u0631\u0627\u0645\u062c \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629. \n \n\u0645\u062a\u064a \u0638\u0647\u0631\u062a \u0627\u0644\u0640 CVE\u061f  \n\u062a\u0645 \u0625\u0637\u0644\u0627\u0642 CVE \u0644\u0623\u0648\u0644 \u0645\u0631\u0629 \u0641\u064a \u0639\u0627\u0645 1999\u060c \u062a\u062a\u0645 \u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0642\u0628\u0644 \u0645\u0646\u0638\u0645\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0648\u0637\u0646\u064a | National Cybersecurity FFRDC (Federally Funded Research and Development Center) \u060c \u0648\u0630\u0644\u0643 \u0628\u0631\u0639\u0627\u064a\u0629 \u0627\u0644\u062d\u0643\u0648\u0645\u0629 \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629\u060c \u0648\u062a\u0633\u0627\u0647\u0645 \u0623\u064a\u0636\u0627\u064b \u0643\u0644\u0627\u064b \u0645\u0646 \u0648\u0632\u0627\u0631\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u062f\u0627\u062e\u0644\u064a \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 (DHS) \u0648 \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 (CISA) \u0641\u064a \u062a\u0645\u0648\u064a\u0644 \u062a\u0634\u063a\u064a\u0644\u0647\u0627. \n \n  \n \n\u0645\u0645\u0627 \u064a\u062a\u0643\u0648\u0646 \u0645\u064f\u0639\u0631\u0641 \u0627\u0644\u0640 CVE\u061f \n\u0644\u0643\u0644 CVE \u0645\u064f\u0639\u0631\u0641 \u064a\u062a\u0645 \u062a\u0639\u064a\u064a\u0646\u0647 \u0628\u0648\u0627\u0633\u0637\u0629 \u0623\u0643\u062b\u0631 \u0645\u0646 100 \u0645\u0631\u062c\u0639 \u062a\u0631\u0642\u064a\u0645 \"CVE Numbering Authorities (CNAs)\"\u060c \u062a\u0634\u0645\u0644 CNA \u0628\u0627\u0626\u0639\u064a \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \"IT vendors\"\u060c \u0627\u0644\u062c\u0627\u0645\u0639\u0627\u062a\u060c \u0634\u0631\u0643\u0627\u062a \u0648\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u060c \u0648\u0623\u064a\u0636\u0627\u064b MITRE \u0646\u0641\u0633\u0647\u0627. \n \n\u0645\u064f\u0639\u0631\u0641 CVE \u064a\u0643\u0648\u0646 \u0628\u0647\u0630\u0627 \u0627\u0644\u0634\u0643\u0644  CVE-[Year]-[Number]\u060c \u0641\u0627\u0644\u0633\u0646\u0629 \u0647\u064a \u0627\u0644\u0633\u0646\u0629 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0644\u0625\u0628\u0644\u0627\u063a \u0641\u064a\u0647\u0627 \u0639\u0646 \u0627\u0644\u062b\u063a\u0631\u0629\u060c \u0623\u0645\u0627 \u0627\u0644\u0631\u0642\u0645 \u0647\u0648 \u0631\u0642\u0645 \u062a\u0633\u0644\u0633\u0644\u064a \u064a\u062a\u0645 \u0648\u0636\u0639\u0647 \u0645\u0646 \u0642\u0628\u0644 \u0627\u0644\u0640 CNA. \n \n\u0639\u0644\u064a \u0633\u0628\u064a\u0644 \u0627\u0644\u0645\u062b\u0627\u0644 CVE-2019-0708\u060c \u0647\u0648 \u062b\u063a\u0631\u0629 \u0641\u064a \u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 \u0633\u0637\u062d \u0627\u0644\u0645\u0643\u062a\u0628 \u0627\u0644\u0628\u0639\u064a\u062f (RDP) \u0645\u0646 \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a\u060c \u0648\u0642\u062f \u062a\u0623\u062e\u062f \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0642\u0628 \u063a\u064a\u0631 \u0631\u0633\u0645\u064a \u0643\u0637\u0631\u064a\u0642\u0629 \u0633\u0647\u0644\u0629 \u0644\u062a\u0630\u0643\u0631 \u062a\u0644\u0643 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629\u060c \u0648\u062d\u062a\u064a \u0623\u0646\u0647\u0627 \u0642\u062f \u062a\u062d\u0635\u0644 \u0639\u0644\u064a \u0634\u0639\u0627\u0631 \u0623\u0648 \u0631\u0633\u0645 \u062e\u0627\u0635 \u0628\u0647\u0627\u060c \u0648\u0630\u0644\u0643 \u064a\u062a\u0645 \u0645\u0646 \u0642\u0628\u0644 \u0641\u0631\u0642 \u0627\u0644\u062a\u0633\u0648\u064a\u0642 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u062a\u0637\u0644\u0639 \u0644\u0646\u0634\u0631 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0639\u0646 \u062a\u0644\u0643 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0644\u062c\u0630\u0628 \u0627\u0644\u0635\u062d\u0641\u064a\u064a\u0646. \n \n\u0627\u0644\u0641\u0648\u0627\u0626\u062f \u0645\u0646 \u0627\u0644\u0640 CVE: \n\u062a\u062a\u064a\u062d \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0648\u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0648\u0636\u0639 \u0623\u0633\u0627\u0633 \u0644\u062a\u0642\u064a\u064a\u0645 \u0623\u062f\u0648\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0627\u060c \u0648\u0645\u0639\u0631\u0641\u0629 \u0645\u0627 \u062a\u063a\u0637\u064a\u0647 \u0643\u0644 \u0623\u062f\u0627\u0629 \u0648\u0645\u062f\u064a \u0645\u0644\u0627\u0626\u0645\u062a\u0647\u0627 \u0644\u0644\u0645\u0624\u0633\u0633\u0629. \n\u062a\u0645\u0643\u0646 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0623\u064a\u0636\u0627\u064b \u0645\u0646 \u0627\u0644\u062d\u0635\u0648\u0644 \u0628\u0633\u0631\u0639\u0629 \u0648\u062f\u0642\u0629 \u0639\u0644\u064a \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0639\u0646 \u062a\u0644\u0643 \u0627\u0644\u062b\u063a\u0631\u0627\u062a. \n\u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0633\u062a\u062e\u062f\u0645 \u0623\u064a\u0636\u0627\u064b \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u064a \u062a\u0648\u0642\u064a\u0639\u0627\u062a \"signatures\" \u0647\u062c\u0648\u0645 \u0645\u0639\u0631\u0648\u0641\u0629 \u0644\u062a\u062d\u062f\u064a\u062f \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629. \n  \n \n\u0645\u0646 \u064a\u0628\u0644\u064e\u063a \u0639\u0646 \u0627\u0644\u0640 CVE\u061f \n\u0627\u0644\u0628\u0627\u062d\u062b\u064a\u0646. \n\u0627\u0644\u0642\u0631\u0627\u0635\u0646\u0629 \u0630\u0648 \u0627\u0644\u0642\u0628\u0639\u0627\u062a \u0627\u0644\u0628\u064a\u0636\u0627\u0621 | white hat hackers. \n\u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u062a\u0642\u0648\u0645 \u0628\u062a\u0634\u062c\u064a\u0639 \u0627\u0644\u0623\u0634\u062e\u0627\u0635 \u0644\u0644\u0628\u062d\u062b \u0639\u0646 \u062b\u063a\u0631\u0627\u062a \u0623\u0645\u0646\u064a\u0629\u060c \u0648\u064a\u0643\u0648\u0646 \u0647\u0646\u0627\u0643 \u0645\u0643\u0627\u0641\u0626\u0627\u062a\u060c \u0648\u0628\u0630\u0644\u0643 \u064a\u062a\u0645 \u062a\u062d\u0633\u064a\u0646 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0623\u0645\u0646\u064a \u0644\u0644\u0645\u0646\u062a\u062c\u0627\u062a. \n\u064a\u0645\u0643\u0646 \u0644\u0623\u064a \u0634\u062e\u0635 \u0627\u0644\u0623\u0628\u0644\u0627\u063a \u0639\u0646 CVE \u0644\u0640 CNA. \n\u0647\u0646\u0627\u0643 \u0623\u064a\u0636\u0627\u064b \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0623\u0633\u0645\u0627\u0621 \u0627\u0644\u0643\u0628\u064a\u0631\u0629\u0627\u0644\u062a\u064a \u062a\u0642\u0648\u0645 \u0628\u0630\u0644\u0643 (Google\u060c Facebook\u060c Cisco\u060c IBM\u060c Intel\u060c Dell\u060c Apple\u060c Adobe\u060c MITRE\u060c ... \u0648\u063a\u064a\u0631\u0647\u0645). \n\u0643\u0645 \u064a\u0628\u0644\u063a \u0639\u062f\u062f CVEs\u061f \n \n \n\u0647\u0646\u0627\u0643 \u0627\u0644\u0622\u0644\u0627\u0641 \u0645\u0646 \u0627\u0644\u0640 CVEs \u064a\u062a\u0645 \u0625\u064a\u062c\u0627\u062f\u0647\u0627 \u0643\u0644 \u0639\u0627\u0645\u060c \u0641\u0645\u0646\u0630 \u0623\u0646 \u0628\u062f\u0623\u062a \u0641\u064a \u0639\u0627\u0645 1999\u0645\u060c \u062a\u0645 \u0625\u0635\u062f\u0627\u0631 \u0623\u0643\u062b\u0631 \u0645\u0646 130 \u0623\u0644\u0641 \u0645\u064f\u0639\u0631\u0641 CVE \u062d\u064a\u062b \u0623\u0646\u0647 \u0628\u0645\u0639\u062f\u0644 12 \u0623\u0644\u0641 \u0625\u0644\u064a 15 \u0623\u0644\u0641 CVE \u0633\u0646\u0648\u064a\u0627\u064b\u060c \u0648\u0642\u062f \u0628\u0644\u063a \u0639\u062f\u062f\u0647\u0645 \u062d\u0627\u0644\u064a\u0627\u064b \u0623\u0643\u062b\u0631 \u0645\u0646 5 \u0622\u0644\u0627\u0641 \u0647\u0630\u0627 \u0627\u0644\u0639\u0627\u0645 \"2023\" \u0648\u0645\u0627 \u0632\u0627\u0644 \u0647\u0646\u0627\u0643 \u0627\u0644\u0643\u062b\u064a\u0631. \n \n\u064a\u0645\u0643\u0646\u0643 \u062a\u0635\u0641\u062d \u062c\u0645\u064a\u0639 \u0627\u0644\u0640 CVEs \u0645\u0646 \u062e\u0644\u0627\u0644 CVE Details\u060c \u0648\u0645\u0639\u0631\u0641\u0629 \u062a\u0641\u0627\u0635\u064a\u0644 \u0623\u0643\u062b\u0631 \u0639\u0646 \u062a\u0644\u0643 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.", "creation_timestamp": "2024-04-20T16:28:55.000000Z"}