One episode and several failed attempts to fix vulnerabilities, an interesting Rocket.Chat XSS and an exploitable TXT file abusing some weird features.
\n\n[00:00:46] nOtWASP bottom 10: vulnerabilities that make you cry
\n
\n[00:07:28] Click here for free TV! - Chaining bugs to takeover Wind Vision accounts
\n
\n[00:15:28] Elevate Yourself to Admin in Umbraco CMS 8.9.0 (CVE-2020-29454)
\n
\n[00:23:19] "netmask" npm package vulnerable to octal input data [CVE-2021-28918]
\n
\n[00:28:38] [HackerOne] Jira integration plugin Leaked JWT
\n
\n[00:33:20] [Kaspersky] A vulnerability in KAVKIS 2020 products family allows full disabling of protection
\n
\n[00:38:06] [Rocket.Chat] Account takeover via XSS
\n
\n[00:43:18] This man thought opening a TXT file is fine, he thought wrong. macOS [CVE-2019-8761]
\n
\n[00:52:41] Who Contains the Containers?
\n
\n[01:06:11] Getting Code Execution on Apache Druid [CVE-2021-25646]
\n
\n[01:12:59] Security Analysis of AMD Predictive Store Forwarding
\n
\n[01:19:58] Pluralsight free for April
\n
\n[01:21:54] Pwn2Own 2021
\n
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
\nOr the video archive on Youtube (@dayzerosec)