A Facebook DOM-based XSS, Rocket.chat and Github Actions RCEs, and a Brave Browser information disclosure in this week's episode.
- [00:00:50] Pwn2Own Tokyo (Live from Toronto) - Schedule and Results
- [00:12:00] Tianfu Cup - Results
- [00:16:28] Unlimited Chase Ultimate Rewards Points
- [00:26:09] Github: Widespread injection vulnerabilities in Actions
- [00:36:37] About the security content of iOS 14.2 and iPadOS 14.2
- [00:42:04] Rocket.Chat Desktop RCE
- [00:44:44] git-lfs RCE
- [00:46:46] Attack of the clones: Git clients remote code execution
- [00:48:17] YOURLS 1.5 - 1.7.10, Multiple Stored XSS Vulnerabilities in Admin Panel
- [00:53:23] Company forced to change name that could be used to hack websites
- [00:57:12] Facebook DOM Based XSS using postMessage
- [01:03:00] SQL Injection and Reflected XSS in Oracle Communications Diameter Signaling Router
- [01:06:00] Re-discovering a JWT Authentication Bypass in ServiceStack
- [01:10:45] How I found a Tor vulnerability in Brave Browser, reported it, watched it get patched, got a CVE (CVE-2020-8276) and a small bounty, all in one working day
- [01:18:12] Exploiting Microsoft Store Games [CVE-2020-16877]
- [01:26:21] Fuzzing for eBPF JIT bugs in the Linux kernel
- [01:41:18] Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
Or the video archive on Youtube (@DAY[0])


