{"uuid": "e05f8d0f-e6ed-4c1f-a9fa-00d43b5184df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-8791", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/2535", "content": "#Red_Team_Tactics\n1. Hijacking connections without injections: a ShadowMoving approach to the art of pivoting\nhttps://adepts.of0x.cc/shadowmove-hijack-socket\n2. Abusing CVE-2019-8791, CVE-2019-8792 in Shazam (iOS/Android)\nhttps://ash-king.co.uk/blog/Shazlocate-abusing-CVE-2019-8791-CVE-2019-8792", "creation_timestamp": "2021-01-20T11:06:01.000000Z"}