Authentication bypasses, a Duo 2FA bypass, RCEs, a VM escape, and some reverse engineering writeups.
[00:00:26] Project Zero: Policy and Disclosure: 2021 Edition
[00:06:27] Remote exploitation of a man-in-the-disk vulnerability in WhatsApp [CVE-2021-24027]
[00:14:06] Allow arbitrary URLs, expect arbitrary code execution
[00:18:29] GHSL-2020-340: log injection in SAP/Infrabox
[00:22:21] Duo Two-factor Authentication Bypass
[00:31:22] [Grammarly] Ability to DOS any organization's SSO and open up the door to account takeovers
[00:35:50] From 0 to RCE: Cockpit CMS
[00:41:41] Big Bugs: Bitbucket Pipelines Kata Containers Build Container Escape
[00:48:52] xscreensaver: raw socket leaked
[00:51:31] Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)
[00:59:49] Exploiting System Mechanic Driver
[01:03:27] Zero-day vulnerability in Desktop Window Manager used in the wild [CVE-2021-28310]
[01:08:33] Windows Defender mpengine remote code execution [CVE-2021-1647]
[01:13:55] ELECTRIC CHROME - CVE-2020-6418 on Tesla Model 3
[01:20:36] QEMU and U: Whole-system tracing with QEMU customization
[01:21:31] Learning Resource - Hexterisk Blog
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@dayzerosec)