Day[0]

En podcast af dayzerosec

Kategorier:

259 Episoder

  1. [bounty] Client-Side Path Traversal and Hiding Your Entitlement(s)

    Udgivet: 17.1.2023
  2. [binary] Attacking Bhyves and a Kernel UAF

    Udgivet: 12.1.2023
  3. [bounty] Web Hackers vs. Cars and a Facebook Account Takeover

    Udgivet: 10.1.2023
  4. [binary] JS Type Confusions and Bringing Back Stack Attacks

    Udgivet: 15.12.2022
  5. [bounty] Pwn2Own Bugs and WAF Bypasses

    Udgivet: 13.12.2022
  6. [binary] A Huawei Hypervisor Vuln and More Memory Safety

    Udgivet: 8.12.2022
  7. [bounty] Remotely Controlling Hyundai and a League of Legends XSS

    Udgivet: 6.12.2022
  8. [binary] Patch Gaps and Apple Neural Engine Vulns

    Udgivet: 1.12.2022
  9. [bounty] Tailscale RCE, an SQLi in PAM360, and Exploiting Backstage

    Udgivet: 29.11.2022
  10. [binary] Hacking Pixel Bootloaders and Injecting Bugs

    Udgivet: 24.11.2022
  11. [bounty] Racing Grafana, Stealing Mastadon Passwords, and Cross-Site Tracing

    Udgivet: 22.11.2022
  12. [binary] Exploiting Undefined Behavior and a Chrome UAF

    Udgivet: 17.11.2022
  13. [bounty] Bypassing Pixel Lock Screens and Checkmk RCE

    Udgivet: 15.11.2022
  14. [binary] OpenSSL Off-by-One, Java XML Bugs, and an In-the-Wild Samsung Chain

    Udgivet: 10.11.2022
  15. [bounty] Apache Batik, Static Site Generators, and an Android App Vuln

    Udgivet: 8.11.2022
  16. [binary] XNU's kalloc_type, Stranger Strings, and a NetBSD Bug

    Udgivet: 3.11.2022
  17. [bounty] A Galaxy Store Bug, Facebook CSRF, and Google IDOR

    Udgivet: 1.11.2022
  18. [binary] Edge Vulns, a SHA-3 Overflow, and an io_uring Exploit

    Udgivet: 27.10.2022
  19. [bounty] XMPP Stanza Smuggling in Jabber and a Cobalt Strike RCE

    Udgivet: 25.10.2022
  20. [binary] Some Browser Exploitation and a Format String Bug?

    Udgivet: 20.10.2022

5 / 13

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.

Visit the podcast's native language site