Listen "[binary] i.MX Secure Boot Bypass and a Hancom Office Underflow"
Episode Synopsis
Just a couple issues this week and a discussion about why you should look at old vulnerabilities and the pace exploit development advanced at.
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/158.html
[00:00:00] Introduction
[00:00:26] Spot the Vuln - Authentic Token ... Fixed
[00:05:42] Hancom Office 2020 Hword Docx XML parsing heap underflow vulnerability
[00:11:07] Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
[00:22:21] Discussion: Why Care About Old Vulnerabilities
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/158.html
[00:00:00] Introduction
[00:00:26] Spot the Vuln - Authentic Token ... Fixed
[00:05:42] Hancom Office 2020 Hword Docx XML parsing heap underflow vulnerability
[00:11:07] Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
[00:22:21] Discussion: Why Care About Old Vulnerabilities
More episodes of the podcast Day[0]
Exploiting VS Code with Control Characters
12/05/2025
Pulling Gemini Secrets and Windows HVPT
16/04/2025
ESP32 Backdoor Drama and SAML Auth Bypasses
17/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.