We've got a few interesting vulns, a blind format string attack, Windows kernel int overflow, and a browser exploit (unchecked bounds after lowering).
\nLinks and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/160.html
\n[00:00:00] Introduction
\n[00:00:24] Spot the Vuln - Chat Configuration
\n[00:02:06] CCC Cancelled
\n[00:07:53] Hacking TMNF: Part 2 - Exploiting a blind format string
\n[00:19:17] Windows Kernel integer overflows in registry subkey lists leading to memory corruption
\n[00:28:13] Browser Exploitation: A Case Study Of CVE-2020-6507
\n[00:45:48] Chat Question: Getting Into Browser Exploitation
\n