On the web side, we cover a portswigger post on ways of abusing unicode mishandling to bypass firewalls and a doyensec guide to OAuth vulnerabilities. We also get into a Windows exploit for a use-after-free in the telephony service that bypasses Control Flow Guard, and a data race due to non-atomic writes in the macOS kernel.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/271.html
[00:00:00] Introduction
[00:00:22] Bypassing character blocklists with unicode overflows
[00:06:53] Common OAuth Vulnerabilities
[00:18:37] Windows Telephony Service - It's Got Some Call-ing Issues [CVE-2024-26230]
[00:32:05] TRAVERTINE (CVE-2025-24118)
Podcast episodes are available on the usual podcast platforms:
-- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063
-- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt
-- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz
-- Other audio platforms can be found at https://anchor.fm/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9