home.social

#pwn2own — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #pwn2own, aggregated by home.social.

  1. In under a minute!! ⏰ Billy, Bruce Chen, Pan Zhenpeng & Weiming Shi (@st424204, @bruce30262, @Peterpan980927 & @bestswngs) of STARLabs SG was able to exploit Megatron Bridge! Now to skeddadle off to the disclosure room to share the lore. #Pwn2Own #P2OBerlin

  2. In under a minute!! ⏰ Billy, Bruce Chen, Pan Zhenpeng & Weiming Shi (@st424204, @bruce30262, @Peterpan980927 & @bestswngs) of STARLabs SG was able to exploit Megatron Bridge! Now to skeddadle off to the disclosure room to share the lore. #Pwn2Own #P2OBerlin

  3. In under a minute!! ⏰ Billy, Bruce Chen, Pan Zhenpeng & Weiming Shi (@st424204, @bruce30262, @Peterpan980927 & @bestswngs) of STARLabs SG was able to exploit Megatron Bridge! Now to skeddadle off to the disclosure room to share the lore. #Pwn2Own #P2OBerlin

  4. In under a minute!! ⏰ Billy, Bruce Chen, Pan Zhenpeng & Weiming Shi (@st424204, @bruce30262, @Peterpan980927 & @bestswngs) of STARLabs SG was able to exploit Megatron Bridge! Now to skeddadle off to the disclosure room to share the lore. #Pwn2Own #P2OBerlin

  5. In under a minute!! ⏰ Billy, Bruce Chen, Pan Zhenpeng & Weiming Shi (@st424204, @bruce30262, @Peterpan980927 & @bestswngs) of STARLabs SG was able to exploit Megatron Bridge! Now to skeddadle off to the disclosure room to share the lore. #Pwn2Own #P2OBerlin

  6. Another big W! David Tae & Louis Hur of Out Of Bounds was able to exploit Ollama! They're now off to the disclosure room to spill the beans. #Pwn2Own #P2OBerlin

  7. Another big W! David Tae & Louis Hur of Out Of Bounds was able to exploit Ollama! They're now off to the disclosure room to spill the beans. #Pwn2Own #P2OBerlin

  8. Another big W! David Tae & Louis Hur of Out Of Bounds was able to exploit Ollama! They're now off to the disclosure room to spill the beans. #Pwn2Own #P2OBerlin

  9. Another big W! David Tae & Louis Hur of Out Of Bounds was able to exploit Ollama! They're now off to the disclosure room to spill the beans. #Pwn2Own #P2OBerlin

  10. Another big W! David Tae & Louis Hur of Out Of Bounds was able to exploit Ollama! They're now off to the disclosure room to spill the beans. #Pwn2Own #P2OBerlin

  11. Coming up next! Stay tuned for more exploits, more surprises, and more fun. #Pwn2Own #P2OBerlin

  12. Coming up next! Stay tuned for more exploits, more surprises, and more fun. #Pwn2Own #P2OBerlin

  13. Coming up next! Stay tuned for more exploits, more surprises, and more fun. #Pwn2Own #P2OBerlin

  14. Coming up next! Stay tuned for more exploits, more surprises, and more fun. #Pwn2Own #P2OBerlin

  15. Coming up next! Stay tuned for more exploits, more surprises, and more fun. #Pwn2Own #P2OBerlin

  16. DOUBLE YAAAAAAAAAA!! Sina Kheirkhah (@SinSinology) of Summoning Team was able to exploit OpenAI Codex! If confirmed, they win $40,000 and 4 Master of Pwn points. They're off to the disclosure room to spill the tea. #Pwn2Own #P2OBerlin

  17. DOUBLE YAAAAAAAAAA!! Sina Kheirkhah (@SinSinology) of Summoning Team was able to exploit OpenAI Codex! If confirmed, they win $40,000 and 4 Master of Pwn points. They're off to the disclosure room to spill the tea. #Pwn2Own #P2OBerlin

  18. DOUBLE YAAAAAAAAAA!! Sina Kheirkhah (@SinSinology) of Summoning Team was able to exploit OpenAI Codex! If confirmed, they win $40,000 and 4 Master of Pwn points. They're off to the disclosure room to spill the tea. #Pwn2Own #P2OBerlin

  19. DOUBLE YAAAAAAAAAA!! Sina Kheirkhah (@SinSinology) of Summoning Team was able to exploit OpenAI Codex! If confirmed, they win $40,000 and 4 Master of Pwn points. They're off to the disclosure room to spill the tea. #Pwn2Own #P2OBerlin

  20. DOUBLE YAAAAAAAAAA!! Sina Kheirkhah (@SinSinology) of Summoning Team was able to exploit OpenAI Codex! If confirmed, they win $40,000 and 4 Master of Pwn points. They're off to the disclosure room to spill the tea. #Pwn2Own #P2OBerlin

  21. There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin

  22. There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin

  23. There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin

  24. There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin

  25. There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin

  26. Unfortunately, Ruitong of Abstract Team, University of Colorado Boulder could not get their exploit of Red Hat Enterprise Linux for Workstations working within the time allotted. #Pwn2Own #P2OBerlin

  27. Unfortunately, Ruitong of Abstract Team, University of Colorado Boulder could not get their exploit of Red Hat Enterprise Linux for Workstations working within the time allotted. #Pwn2Own #P2OBerlin

  28. Unfortunately, Ruitong of Abstract Team, University of Colorado Boulder could not get their exploit of Red Hat Enterprise Linux for Workstations working within the time allotted. #Pwn2Own #P2OBerlin

  29. Unfortunately, Ruitong of Abstract Team, University of Colorado Boulder could not get their exploit of Red Hat Enterprise Linux for Workstations working within the time allotted. #Pwn2Own #P2OBerlin

  30. Unfortunately, Ruitong of Abstract Team, University of Colorado Boulder could not get their exploit of Red Hat Enterprise Linux for Workstations working within the time allotted. #Pwn2Own #P2OBerlin

  31. Kiyong Kwak of Kakaogames and Song Nuri of Samsung Electronics has withdrawn their entry for Apple Safari – Renderer Only in the Web Browser category #Pwn2Own #P2OBerlin

  32. Kiyong Kwak of Kakaogames and Song Nuri of Samsung Electronics has withdrawn their entry for Apple Safari – Renderer Only in the Web Browser category #Pwn2Own #P2OBerlin

  33. Kiyong Kwak of Kakaogames and Song Nuri of Samsung Electronics has withdrawn their entry for Apple Safari – Renderer Only in the Web Browser category #Pwn2Own #P2OBerlin

  34. Kiyong Kwak of Kakaogames and Song Nuri of Samsung Electronics has withdrawn their entry for Apple Safari – Renderer Only in the Web Browser category #Pwn2Own #P2OBerlin

  35. Kiyong Kwak of Kakaogames and Song Nuri of Samsung Electronics has withdrawn their entry for Apple Safari – Renderer Only in the Web Browser category #Pwn2Own #P2OBerlin

  36. Locked in! Le Duc Anh Vu (@vulda17) of Viettel Cyber Security (@vcslab) exploited Cursor, earning $30,000 and 3 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

  37. Locked in! Le Duc Anh Vu (@vulda17) of Viettel Cyber Security (@vcslab) exploited Cursor, earning $30,000 and 3 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

  38. Locked in! Le Duc Anh Vu (@vulda17) of Viettel Cyber Security (@vcslab) exploited Cursor, earning $30,000 and 3 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

  39. Locked in! Le Duc Anh Vu (@vulda17) of Viettel Cyber Security (@vcslab) exploited Cursor, earning $30,000 and 3 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

  40. Locked in! Le Duc Anh Vu (@vulda17) of Viettel Cyber Security (@vcslab) exploited Cursor, earning $30,000 and 3 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

  41. Collision! 💥 Although successful on stage, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Claude Desktop in the Coding Agent category used a bug that was previously known. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin

  42. Collision! 💥 Although successful on stage, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Claude Desktop in the Coding Agent category used a bug that was previously known. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin

  43. Collision! 💥 Although successful on stage, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Claude Desktop in the Coding Agent category used a bug that was previously known. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin

  44. Collision! 💥 Although successful on stage, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Claude Desktop in the Coding Agent category used a bug that was previously known. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin

  45. Collision! 💥 Although successful on stage, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Claude Desktop in the Coding Agent category used a bug that was previously known. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin