{"uuid": "410f7397-ccd1-4200-b923-485a212544c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3094", "type": "seen", "source": "https://t.me/CybNux/6068", "content": "\u062b\u063a\u0631\u0629 \u062e\u0637\u064a\u0631\u0629 \u062c\u062f\u0627\u064b #Backdoor \u0641\u064a \u0627\u063a\u0644\u0628 \u0627\u0646\u0638\u0645\u0629 #\u0644\u064a\u0646\u0643\u0633 \n\n\u0627\u0635\u062f\u0631\u062a RedHat \u062a\u062d\u0630\u064a\u0631 \u0628\u062e\u0635\u0648\u0635 \u0648\u062c\u0648\u062f \u0628\u0648\u0627\u0628\u0647 \u062e\u0644\u0641\u064a\u0629 ( Backdoor ) \u0645\u0632\u0631\u0648\u0639 \u0641\u064a \u0645\u0643\u062a\u0628\u0629 XZ Utils \u0627\u0644\u062e\u0627\u0635\u0647 \u0628\u0636\u063a\u0637 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u062b\u0628\u062a\u0647 \u0645\u0633\u0628\u0642\u0627\u064b \u0639\u0644\u0649 \u0627\u0644\u0643\u062b\u064a\u0631 \u0645\u0646 \u062a\u0648\u0632\u064a\u0639\u0627\u062a \u0644\u064a\u0646\u0643\u0633 \u0627\u0644\u0645\u0634\u0647\u0648\u0631\u0629.\n\u0627\u0644\u0628\u0648\u0627\u0628\u0629 \u0627\u0644\u062e\u0644\u0641\u064a\u0629 \u062a\u0645 \u0627\u062e\u0641\u0627\u0626\u0647\u0627 \u0628\u0637\u0631\u064a\u0642\u0629 \u0645\u0639\u0642\u062f\u0647 \u0641\u064a \u0627\u0644\u0643\u0648\u062f ( obfuscations ).\n\u062a\u0633\u0645\u062d \u0644\u0644\u0645\u062e\u062a\u0631\u0642 \u0628\u0627\u0644\u0648\u0635\u0648\u0644 \u0644\u0644\u0646\u0638\u0627\u0645 \u0645\u0646 \u062e\u0644\u0627\u0644 SSH\n\n\ud83d\udccc \u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u062e\u0637\u0648\u0631\u0629 10\n\n\ud83d\udccc \u0631\u0642\u0645 \u0627\u0644\u062b\u063a\u0631\u0647 CVE-2024-3094\n\n\u0627\u0644\u0631\u0627\u0628\u0637 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-3094\n\n\u3030\ufe0f\u2796\u2796\u2796\u2796\u2796\u2796\u3030\ufe0f", "creation_timestamp": "2024-03-30T23:57:30.000000Z"}