{"vulnerability": "RHSA-2010:0970", "sightings": [{"uuid": "130de841-a898-4bb1-a913-aabd8d3924f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2010:0970", "type": "published-proof-of-concept", "source": "https://t.me/anony_islamicTM/465", "content": "\u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u062a\u0645 \u0623\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0628\u062a\u0627\u0631\u064a\u062e07/12/2010. \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u062a\u0645 \u0646\u0634\u0631\u0647\u0627 \u0628\u062a\u0627\u0631\u064a\u062e 07/12/2010 \u0643\u0640 RHSA-2010:0970 \u0643\u0640 \u0627\u0633\u062a\u0634\u0627\u0631\u064a (CERT.org). \u064a\u0645\u0643\u0646 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u0634\u0627\u0631\u0629 \u0645\u0646 \u0647\u0646\u0627 kb.cert.org.\n\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u062a\u0645 \u062a\u0633\u0645\u064a\u062a\u0647\u0627CVE-2010-4344. \u062a\u0645\u062a \u0625\u062d\u0627\u0644\u0629 \u0627\u0644\u0640 \u0633\u064a \u0641\u064a \u0623\u064a30/11/2010. \u064a\u0645\u0643\u0646 \u0634\u0646 \u0627\u0644\u0647\u062c\u0645\u0629 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0647\u0630\u0647 \u0639\u0646 \u0628\u0639\u062f. \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0645\u062a\u0648\u0641\u0631\u0629. \u0627\u0644\u062a\u0642\u0627\u0631\u064a\u0631 \u062a\u0634\u064a\u0631 \u0628\u0623\u0646 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u0630\u0627\u062a \u0634\u0647\u0631\u0629 \u0623\u0642\u0644 \u0645\u0646 \u0627\u0644\u0645\u062a\u0648\u0633\u0637. \u0647\u0646\u0627\u0644\u0643 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0645\u062a\u0648\u0641\u0631\u0629. \u062a\u0645 \u0627\u0644\u0625\u0628\u0644\u0627\u063a \u0639\u0646 \u0627\u0644 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0648\u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627. \u0633\u0639\u0631 \u0627\u0644 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0647\u0630\u0647 \u064a\u062a\u0631\u0627\u0648\u062d \u0628\u062d\u0648\u0627\u0644\u064a \u062a\u0642\u0631\u064a\u0628\u0627\u064bUSD $0-$5k \u0641\u064a \u0647\u0630\u0647 \u0627\u0644\u0644\u062d\u0638\u0629.\n\n\u062a\u0645 \u0623\u0639\u062a\u0628\u0631\u0627\u0647\u0627 \u0639\u0644\u0649 \u0623\u0646\u0647\u0627 \u0641\u0639\u0627\u0644\u0629 \u0644\u0644\u063a\u0627\u064a\u0629. \u062a\u0633\u062a\u0637\u064a\u0639 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0645\u0646 \u0647\u0646\u0627 securityfocus.com. \u0628\u0645\u0627 \u0623\u0646\u0647\u0627 \u062b\u063a\u0631\u0629 \u0647\u062c\u0648\u0645 \u0641\u0648\u0631\u064a \u0641\u0642\u062f \u0643\u0627\u0646 \u0645\u062a\u0648\u0633\u0637 \u0633\u0639\u0631\u0647\u0627 \u0647\u0648 \u062a\u0642\u0631\u064a\u0628\u0627$0-$5k. \u0628\u0631\u0646\u0627\u0645\u062c \u0646\u064a\u0633\u0648\u0633 \u0644\u0641\u062d\u0635 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u064a\u0648\u0641\u0631 \u0645\u0644\u062d\u0642 \u0628\u0639\u0646\u0648\u0627\u064668160(Oracle Linux 4 / 5 : exim (ELSA-2010-0970)), \u064a\u0645\u0643\u0646\u0643 \u0645\u0646 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0648\u062c\u0648\u062f \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629. \u0623\u0646\u0647\u0627 \u0645\u0635\u0646\u0641\u0629 \u0625\u0644\u0649 \u0639\u0627\u0626\u0644\u0629Oracle Linux Local Security Checks. \u0627\u0644\u0645\u0644\u062d\u0642 \u064a\u0639\u0645\u0644 \u0628\u062d\u0633\u0628 \u0627\u0644\u0635\u0646\u0641local. \u0648\u0647\u0648 \u064a\u0639\u062a\u0645\u062f \u0639\u0644\u0649 \u0627\u0644\u0645\u0646\u0641\u06300. \u062e\u062f\u0645\u0629 \u0641\u062d\u0635 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0643\u0648\u064a\u0644\u0633 \u064a\u0645\u0643\u0646\u0647\u0627 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0628\u0648\u0627\u0633\u0637\u0629 \u0645\u0644\u062d\u0642118827 (Red Hat Update for Exim (RHSA-2010:0970)).\n\n\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0646\u0633\u062e\u0629 \u0625\u0644\u0649 \u0625\u0635\u062f\u0627\u06313.15 \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u062d\u0644 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629. \u062a\u0635\u062d\u064a\u062d \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0647\u0630\u0647 \u064a\u0645\u0643\u0646 \u062a\u062d\u0645\u064a\u0644\u0647 \u0645\u0646 \u0647\u0646\u0627 git.exim.org. \u0646\u0646\u0635\u062d \u0628\u0640 \u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0645\u0643\u0648\u0646 \u0627\u0644\u0645\u062a\u0623\u062b\u0631 \u0628\u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629. \u0627\u0644\u062a\u0635\u062d\u064a\u062d \u062a\u0645 \u0646\u0634\u0631\u06472 \u0623\u064a\u0627\u0645 \u0628\u0639\u062f \u0627\u0644\u0627\u0641\u0635\u0627\u062d \u0639\u0646 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629.\n\n\u0628\u0627\u0644\u0627\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0647\u0630\u0627 \u064a\u0645\u0643\u0646 \u0627\u0644\u0643\u0634\u0641 \u0648\u0645\u0646\u0639 \u0645\u062b\u0644 \u0647\u0630\u0647 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0639\u0646 \u0637\u0631\u064a\u0642 \u0623\u0633\u062a\u062e\u062f\u0627\u0645 \u0628\u0631\u0646\u0627\u0645\u062c \u062a\u0628\u0646\u0643 \u0628\u0648\u064a\u0646\u062a \u0645\u0639 \u0627\u0644\u0641\u0644\u062a\u0631 \u0647\u0630\u062710824. \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u062a\u0645 \u062a\u0633\u062c\u064a\u0644\u0647\u0627 \u0641\u064a \u0642\u0648\u0627\u0639\u062f \u0628\u064a\u0627\u0646\u0627\u062a \u0622\u062e\u0631\u0649: SecurityFocus (BID 45308), Secunia (SA40019), SecurityTracker (ID 1024858), Vulnerability Center (SBV-28629) , Tenable (68160).\n\n\nhttps://t.me/YCS_CVE", "creation_timestamp": "2021-11-19T16:44:48.000000Z"}, {"uuid": "cb6e9d2a-6616-4f17-8130-0e11fef32887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2010:0970", "type": "published-proof-of-concept", "source": "https://t.me/anwar1213xx/1304", "content": "\u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u062a\u0645 \u0623\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0628\u062a\u0627\u0631\u064a\u062e07/12/2010. \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u062a\u0645 \u0646\u0634\u0631\u0647\u0627 \u0628\u062a\u0627\u0631\u064a\u062e 07/12/2010 \u0643\u0640 RHSA-2010:0970 \u0643\u0640 \u0627\u0633\u062a\u0634\u0627\u0631\u064a (CERT.org). \u064a\u0645\u0643\u0646 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u0634\u0627\u0631\u0629 \u0645\u0646 \u0647\u0646\u0627 kb.cert.org.\n\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u062a\u0645 \u062a\u0633\u0645\u064a\u062a\u0647\u0627CVE-2010-4344. \u062a\u0645\u062a \u0625\u062d\u0627\u0644\u0629 \u0627\u0644\u0640 \u0633\u064a \u0641\u064a \u0623\u064a30/11/2010. \u064a\u0645\u0643\u0646 \u0634\u0646 \u0627\u0644\u0647\u062c\u0645\u0629 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0647\u0630\u0647 \u0639\u0646 \u0628\u0639\u062f. \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0645\u062a\u0648\u0641\u0631\u0629. \u0627\u0644\u062a\u0642\u0627\u0631\u064a\u0631 \u062a\u0634\u064a\u0631 \u0628\u0623\u0646 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u0630\u0627\u062a \u0634\u0647\u0631\u0629 \u0623\u0642\u0644 \u0645\u0646 \u0627\u0644\u0645\u062a\u0648\u0633\u0637. \u0647\u0646\u0627\u0644\u0643 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0645\u062a\u0648\u0641\u0631\u0629. \u062a\u0645 \u0627\u0644\u0625\u0628\u0644\u0627\u063a \u0639\u0646 \u0627\u0644 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0648\u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627. \u0633\u0639\u0631 \u0627\u0644 \u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0647\u0630\u0647 \u064a\u062a\u0631\u0627\u0648\u062d \u0628\u062d\u0648\u0627\u0644\u064a \u062a\u0642\u0631\u064a\u0628\u0627\u064bUSD $0-$5k \u0641\u064a \u0647\u0630\u0647 \u0627\u0644\u0644\u062d\u0638\u0629.\n\n\u062a\u0645 \u0623\u0639\u062a\u0628\u0631\u0627\u0647\u0627 \u0639\u0644\u0649 \u0623\u0646\u0647\u0627 \u0641\u0639\u0627\u0644\u0629 \u0644\u0644\u063a\u0627\u064a\u0629. \u062a\u0633\u062a\u0637\u064a\u0639 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0625\u0643\u0633\u0628\u0644\u0648\u064a\u062a \u0645\u0646 \u0647\u0646\u0627 securityfocus.com. \u0628\u0645\u0627 \u0623\u0646\u0647\u0627 \u062b\u063a\u0631\u0629 \u0647\u062c\u0648\u0645 \u0641\u0648\u0631\u064a \u0641\u0642\u062f \u0643\u0627\u0646 \u0645\u062a\u0648\u0633\u0637 \u0633\u0639\u0631\u0647\u0627 \u0647\u0648 \u062a\u0642\u0631\u064a\u0628\u0627$0-$5k. \u0628\u0631\u0646\u0627\u0645\u062c \u0646\u064a\u0633\u0648\u0633 \u0644\u0641\u062d\u0635 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u064a\u0648\u0641\u0631 \u0645\u0644\u062d\u0642 \u0628\u0639\u0646\u0648\u0627\u064668160(Oracle Linux 4 / 5 : exim (ELSA-2010-0970)), \u064a\u0645\u0643\u0646\u0643 \u0645\u0646 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0648\u062c\u0648\u062f \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629. \u0623\u0646\u0647\u0627 \u0645\u0635\u0646\u0641\u0629 \u0625\u0644\u0649 \u0639\u0627\u0626\u0644\u0629Oracle Linux Local Security Checks. \u0627\u0644\u0645\u0644\u062d\u0642 \u064a\u0639\u0645\u0644 \u0628\u062d\u0633\u0628 \u0627\u0644\u0635\u0646\u0641local. \u0648\u0647\u0648 \u064a\u0639\u062a\u0645\u062f \u0639\u0644\u0649 \u0627\u0644\u0645\u0646\u0641\u06300. \u062e\u062f\u0645\u0629 \u0641\u062d\u0635 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0643\u0648\u064a\u0644\u0633 \u064a\u0645\u0643\u0646\u0647\u0627 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0628\u0648\u0627\u0633\u0637\u0629 \u0645\u0644\u062d\u0642118827 (Red Hat Update for Exim (RHSA-2010:0970)).\n\n\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0646\u0633\u062e\u0629 \u0625\u0644\u0649 \u0625\u0635\u062f\u0627\u06313.15 \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u062d\u0644 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629. \u062a\u0635\u062d\u064a\u062d \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0647\u0630\u0647 \u064a\u0645\u0643\u0646 \u062a\u062d\u0645\u064a\u0644\u0647 \u0645\u0646 \u0647\u0646\u0627 git.exim.org. \u0646\u0646\u0635\u062d \u0628\u0640 \u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0645\u0643\u0648\u0646 \u0627\u0644\u0645\u062a\u0623\u062b\u0631 \u0628\u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629. \u0627\u0644\u062a\u0635\u062d\u064a\u062d \u062a\u0645 \u0646\u0634\u0631\u06472 \u0623\u064a\u0627\u0645 \u0628\u0639\u062f \u0627\u0644\u0627\u0641\u0635\u0627\u062d \u0639\u0646 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629.\n\n\u0628\u0627\u0644\u0627\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0647\u0630\u0627 \u064a\u0645\u0643\u0646 \u0627\u0644\u0643\u0634\u0641 \u0648\u0645\u0646\u0639 \u0645\u062b\u0644 \u0647\u0630\u0647 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0639\u0646 \u0637\u0631\u064a\u0642 \u0623\u0633\u062a\u062e\u062f\u0627\u0645 \u0628\u0631\u0646\u0627\u0645\u062c \u062a\u0628\u0646\u0643 \u0628\u0648\u064a\u0646\u062a \u0645\u0639 \u0627\u0644\u0641\u0644\u062a\u0631 \u0647\u0630\u062710824. \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0647\u0630\u0647 \u062a\u0645 \u062a\u0633\u062c\u064a\u0644\u0647\u0627 \u0641\u064a \u0642\u0648\u0627\u0639\u062f \u0628\u064a\u0627\u0646\u0627\u062a \u0622\u062e\u0631\u0649: SecurityFocus (BID 45308), Secunia (SA40019), SecurityTracker (ID 1024858), Vulnerability Center (SBV-28629) , Tenable (68160).\n\n\nhttps://t.me/YCS_CVE", "creation_timestamp": "2021-11-19T16:56:31.000000Z"}]}