Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé Pwn2Own  ✕
Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/
18/05/2025 12:15:10
QRCode
archive.org
thumbnail

During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox.
The highlight was a successful attempt from Nguyen Hoang Thach of STARLabs SG against the VMware ESXi, which earned him $150,000 for an integer overflow exploit.

Dinh Ho Anh Khoa of Viettel Cyber Security was awarded $100,000 for hacking Microsoft SharePoint by leveraging an exploit chain combining an auth bypass and an insecure deserialization flaw.

Palo Alto Networks' Edouard Bochin and Tao Yan also demoed an out-of-bounds write zero-day in Mozilla Firefox, while Gerrard Tai of STAR Labs SG escalated privileges to root on Red Hat Enterprise Linux using a use-after-free bug, and Viettel Cyber Security used another out-of-bounds write for an Oracle VirtualBox guest-to-host escape.

In the AI category, Wiz Research security researchers used a use-after-free zero-day to exploit Redis and Qrious Secure chained four security flaws to hack Nvidia's Triton Inference Server.

On the first day, competitors were awarded $260,000 after successfully exploiting zero-day vulnerabilities in Windows 11, Red Hat Linux, and Oracle VirtualBox, reaching a total of $695,000 earned over the first two days of the contest after demonstrating 20 unique 0-days.

​​​The Pwn2Own Berlin 2025 hacking competition focuses on enterprise technologies, introduces an AI category for the first time, and takes place during the OffensiveCon conference between May 15 and May 17.

bleepingcomputer EN 2025 Firefox NVIDIA Pwn2Own Red-Hat Redis SharePoint VirtualBox Vmware-ESXi Zero-Day BugBounty
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack https://www.wired.com/story/synology-zero-click-vulnerability/
01/11/2024 16:06:26
QRCode
archive.org
thumbnail

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

wired EN 2024 Synology photos vulnerabilities RCE Pwn2Own critical vulnerability
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS https://devco.re/blog/2024/05/24/pwn2own-toronto-2022-a-9-year-old-bug-in-mikrotik-routeros-en/?ref=news.risky.biz
27/05/2024 13:21:43
QRCode
archive.org
thumbnail

DEVCORE research team found a 9-year-old WAN bug on RouterOS, the product of MikroTik. Combined with another bug of the Canon printer, DEVCORE becomes the first team ever to successfully complete an attack chain in the brand new SOHO Smashup category of Pwn2Own. And DEVCORE also won the title of Master of Pwn in Pwn2Own Toronto 2022.

devco.re EN 2024 CVE-2023-32154 Pwn2Own MikroTik-RouterOS
VMware fixes three zero-day bugs exploited at Pwn2Own 2024 https://www.bleepingcomputer.com/news/security/vmware-fixes-three-zero-day-bugs-exploited-at-pwn2own-2024/
14/05/2024 19:58:47
QRCode
archive.org
thumbnail

VMware fixed four security vulnerabilities in the Workstation and Fusion desktop hypervisors, including three zero-days exploited during the Pwn2Own Vancouver 2024 hacking contest.
#Computer #Hypervisor #InfoSec #Pwn2Own #Security #VMware #Zero-Day

Zero-Day Pwn2Own Computer VMware InfoSec Hypervisor Security
Release: VM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) https://zerodayengineering.com/research/pwn2own-2021-vm-escape.html
25/03/2024 19:11:13
QRCode
archive.org

In April 2021 I participated in Pwn2Own Vancouvver competition as a single player, and successfully demonstrated a 0-day virtual machine escape exploit with code execution on Parallels hypervisor. Today I am finally releasing the exploit source code together with a technical walkthrough video talk that I gave on Zero Day Engineering livestream in November 2021.

zerodayengineering EN 2024 exploit 2021 0-day Parallels Pwn2Own VM escape
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver https://www.bleepingcomputer.com/news/security/windows-11-tesla-and-ubuntu-linux-hacked-at-pwn2own-vancouver/
21/03/2024 08:42:41
QRCode
archive.org
thumbnail

On the first day of Pwn2Own Vancouver 2024, contestants demoed Windows 11, Tesla, and Ubuntu Linux zero-day vulnerabilities and exploit chains to win $732,500 and a Tesla Model 3 car.

bleepingcomputer EN 2024 Competition Exploit Hacking Linux Pwn2Own Tesla Windows Windows-11 Zero-Day
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest https://www.securityweek.com/vmware-patches-critical-vulnerability-disclosed-at-pwn2own-hacking-contest/
26/04/2023 11:27:38
QRCode
archive.org
thumbnail

VMware this week released patches for a critical vulnerability disclosed at the Pwn2Own Vancouver 2023 hacking contest.

securityweek EN 2023 VMware critical vulnerability Pwn2Own CVE-2023-20869
Exploiting an Unbounded memcpy in Parallels Desktop https://blog.ret2.io/2022/05/19/pwn2own-2021-parallels-desktop-exploit/
20/05/2022 11:15:52
QRCode
archive.org
thumbnail

This post details the development of a guest-to-host virtualization escape for Parallels Desktop on macOS, as used in our successful Pwn2Own 2021 entry. Give...

ret2 EN 2022 macOS Parallels Pwn2Own escape exploit VM vulnerability research reverseengineering binary-exploitation program-analysis
4490 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio