Listen "[bounty] Reading GitLab Hidden HackerOne Reports and Golang Parameter Smuggling"
Episode Synopsis
We are back at it, covering some write-ups and exploits we found interesting this summer. From browse-powered desyncs, to account take overs.
Links are available on our website at: https://dayzerosec.com/podcast/reading-gitlab-hidden-hackerone-reports-and-golang-parameter-smuggling.html
[00:02:17] Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor
[00:15:03] [GitLab] Able to view hackerone report attachments
[00:26:59] Forwarding addresses is hard [CVE-2022-31813]
[00:32:18] "ParseThru" – Exploiting HTTP Parameter Smuggling in Golang
[00:46:41] Browser-Powered Desync Attacks
[01:09:30] Scraping the bottom of the CORS barrel (part 1)
Links are available on our website at: https://dayzerosec.com/podcast/reading-gitlab-hidden-hackerone-reports-and-golang-parameter-smuggling.html
[00:02:17] Ridiculous vulnerability disclosure process with CrowdStrike Falcon Sensor
[00:15:03] [GitLab] Able to view hackerone report attachments
[00:26:59] Forwarding addresses is hard [CVE-2022-31813]
[00:32:18] "ParseThru" – Exploiting HTTP Parameter Smuggling in Golang
[00:46:41] Browser-Powered Desync Attacks
[01:09:30] Scraping the bottom of the CORS barrel (part 1)
More episodes of the podcast Day[0]
Exploiting VS Code with Control Characters
12/05/2025
Pulling Gemini Secrets and Windows HVPT
16/04/2025
ESP32 Backdoor Drama and SAML Auth Bypasses
17/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.