{"uuid": "e5848df2-5f99-4c94-9a93-4d518bf5e66f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11579", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/1507", "content": "#Red_Team_Tactics\n1. New iOS kernel exploitation technique that turns a one-byte controlled heap overflow directly into a read/write primitive for arbitrary physical addresses (PoC)\nhttps://googleprojectzero.blogspot.com/2020/07/one-byte-to-rule-them-all.html\n2. Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB\nhttps://github.com/ShielderSec/CVE-2020-11579\n3. Zoom Security Exploit - Cracking private meeting passwords\nhttps://www.tomanthony.co.uk/blog/zoom-security-exploit-crack-private-meeting-passwords", "creation_timestamp": "2022-06-09T03:08:53.000000Z"}