Listen "[binary] Pwning Camera and Overflowing your Integers"
Episode Synopsis
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/pwning-camera-and-overflowing-your-integers.html
Short episode this week, stack smashing, integer overflowing and a more logical issue. Ending off with a discussion about what to do when you're stuck on CTFs.
[00:00:42] Spot the Vuln - One at a Time
[00:04:15] Uniview PreAuth RCE
[00:06:59] Adobe Acrobat Reader DC annotation gestures integer overflow vulnerability
[00:12:31] Chrome: Interface ID reuse leading to memory corruption in IPC::ChannelAssociatedGroupController
[00:18:31] Question: Unsuccessful getting into CTFs
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
Short episode this week, stack smashing, integer overflowing and a more logical issue. Ending off with a discussion about what to do when you're stuck on CTFs.
[00:00:42] Spot the Vuln - One at a Time
[00:04:15] Uniview PreAuth RCE
[00:06:59] Adobe Acrobat Reader DC annotation gestures integer overflow vulnerability
[00:12:31] Chrome: Interface ID reuse leading to memory corruption in IPC::ChannelAssociatedGroupController
[00:18:31] Question: Unsuccessful getting into CTFs
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.
More episodes of the podcast Day[0]
Exploiting VS Code with Control Characters
12/05/2025
Pulling Gemini Secrets and Windows HVPT
16/04/2025
ESP32 Backdoor Drama and SAML Auth Bypasses
17/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.