Day[0]

Un pódcast de dayzerosec

Categorías:

259 Episodo

  1. [bounty] Client-Side Path Traversal and Hiding Your Entitlement(s)

    Publicado: 17/1/2023
  2. [binary] Attacking Bhyves and a Kernel UAF

    Publicado: 12/1/2023
  3. [bounty] Web Hackers vs. Cars and a Facebook Account Takeover

    Publicado: 10/1/2023
  4. [binary] JS Type Confusions and Bringing Back Stack Attacks

    Publicado: 15/12/2022
  5. [bounty] Pwn2Own Bugs and WAF Bypasses

    Publicado: 13/12/2022
  6. [binary] A Huawei Hypervisor Vuln and More Memory Safety

    Publicado: 8/12/2022
  7. [bounty] Remotely Controlling Hyundai and a League of Legends XSS

    Publicado: 6/12/2022
  8. [binary] Patch Gaps and Apple Neural Engine Vulns

    Publicado: 1/12/2022
  9. [bounty] Tailscale RCE, an SQLi in PAM360, and Exploiting Backstage

    Publicado: 29/11/2022
  10. [binary] Hacking Pixel Bootloaders and Injecting Bugs

    Publicado: 24/11/2022
  11. [bounty] Racing Grafana, Stealing Mastadon Passwords, and Cross-Site Tracing

    Publicado: 22/11/2022
  12. [binary] Exploiting Undefined Behavior and a Chrome UAF

    Publicado: 17/11/2022
  13. [bounty] Bypassing Pixel Lock Screens and Checkmk RCE

    Publicado: 15/11/2022
  14. [binary] OpenSSL Off-by-One, Java XML Bugs, and an In-the-Wild Samsung Chain

    Publicado: 10/11/2022
  15. [bounty] Apache Batik, Static Site Generators, and an Android App Vuln

    Publicado: 8/11/2022
  16. [binary] XNU's kalloc_type, Stranger Strings, and a NetBSD Bug

    Publicado: 3/11/2022
  17. [bounty] A Galaxy Store Bug, Facebook CSRF, and Google IDOR

    Publicado: 1/11/2022
  18. [binary] Edge Vulns, a SHA-3 Overflow, and an io_uring Exploit

    Publicado: 27/10/2022
  19. [bounty] XMPP Stanza Smuggling in Jabber and a Cobalt Strike RCE

    Publicado: 25/10/2022
  20. [binary] Some Browser Exploitation and a Format String Bug?

    Publicado: 20/10/2022

5 / 13

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.

Visit the podcast's native language site