Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Bank of England, FCA and Treasury Raise Alarm Over Frontier AI

May 18, 2026

Security Researchers Find 47 Zero-Days at Pwn2Own Berlin

May 18, 2026

Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

May 18, 2026
Facebook X (Twitter) Instagram
Monday, May 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Security Researchers Find 47 Zero-Days at Pwn2Own Berlin
News

Security Researchers Find 47 Zero-Days at Pwn2Own Berlin

Team-CWDBy Team-CWDMay 18, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers were awarded close to $1.3m after discovering 47 zero-day vulnerabilities at Pwn2Own Berlin.

The three-day event, held between May 14 and May 16 and sponsored by TrendAI’s Zero Day Initiative (ZDI), was won by the Devcore team, which claimed a massive $505,000 in prize money.

This edition of the long-running event had an enterprise focus, with AI databases, coding agents, local inferences and NVIDIA products all targeted by competing teams.

As always, newly discovered vulnerabilities will be responsibly disclosed to the relevant vendors to build into security updates. They have 90 days to release security patches before the ZDI publicly discloses them.

Read more on vulnerability management: Pwn2Own Offers $1m for Zero-Click WhatsApp Exploit.

Among the highlights of this year’s competition were:

  • Nguyen Hoang Thach of STARLabs SG used a memory corruption bug to exploit VMware ESXi with the cross-tenant code execution add-on, earning $200,000
  • “splitline” of Devcore Research Team chained two bugs to exploit Microsoft SharePoint, earning $100,000
  • Orange Tsai of Devcore Research Team chained three bugs to achieve remote code execution as system on Microsoft Exchange, earning $200,000
  • Devcore’s Orange Tsai chained four logic bugs to achieve a sandbox escape on Microsoft Edge, earning $175,000

Pwn2Berlin 2026: An AI Focus

This year’s Berlin event, which was held at the OffensiveCon show, focused heavily on artificial intelligence again.

It featured AI databases such as Chroma, Postgres pgvector and Oracle Autonomous AI Database, as well as – for the first time – coding agents Cursor, Claude Code and OpenAI Codex.

“At some point or another, we’ve probably all vibe coded something. There’s no shame in that, but how secure are the tools we use for vibe coding?” said ZDI head of threat awareness, Dustin Childs.

“A successful entry must interact with a contestant-controlled resource (e.g. web page, repository, media file) to exploit a vulnerability within the coding agent. The attack vector of the entry must be a common coding agent use case.”

Many of the big names in the large language model (LLM) space were also present, including Ollama, LiteLLM, LM Studio, and Llama.cpp.

When it came to NVIDIA, competitors tried their luck at hacking the vendor’s Megatron Bridge, NV Container Toolkit, and Dynamo offerings.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
Next Article Bank of England, FCA and Treasury Raise Alarm Over Frontier AI
Team-CWD
  • Website

Related Posts

News

Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

May 18, 2026
News

Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

May 18, 2026
News

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

May 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Chronology of a Skype attack

February 5, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.