Posts
2454
Following
555
Followers
1266
A drunken debugger

Heretek of Silent Signal
repeated
I think to be true to myself next time I should only boost failing entries (that had the same work and thought put into them as winning ones) from #Pwn2Own.

#failnight
0
0
1
repeated

As a reminder - you can find all of the results from Day Two of Ireland at https://www.zerodayinitiative.com/blog/2024/10/23/pwn2own-ireland-2024-day-two-results

0
1
0
repeated
repeated

Confirmed! PHP Hooligans / Midnight Blue (@midnightbluelab) used a command injection bug to get code execution on the Synology BeeStation BST150-4T. They earn $40,000 and 4 Master of Pwn points.

0
1
0
repeated
#music #grindcore
Show content
2
1
2
repeated

Confirmed! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck used two bugs (incl a CLRF injenction) in a beautiful chain to exploit the QNAP TS-464 NAS. The second round win earns them $20,000 and 4 Master of Pwn points.

1
2
0
repeated

In out fist video highlight of Day Two, we see Ken Gannon (@Yogehi) bring 5 bugs and a tone of emotion to bear against the Galaxy. @P2OIreland https://youtube.com/shorts/eM9dOhHH2AA?feature=share

0
1
0
repeated

Boom! It took no time at all for the Viettel Cyber Security (@vcslab) team to exploit the HP Color LaserJet Pro MFP 3301fdw printer. They head of to the disclosure room to provide all the details.

0
1
0
repeated
repeated

Nice! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck successfully exploited the QNAP TS-464 NAS. They're off to the disclosure room to explain how they did it.

0
2
0
repeated

Sweet! The InfoSect (@infosectcbr) team successfully exploited the Sonos Era 300 speaker. They head of to the disclosure room to divulge how they did it.

0
2
0
On a related #UX note, which genius decided that in #Akkoma ":D" should automatically translate to 🧬?
0
0
1
If the primary use-case of your app is users typing text, you shouldn't have hotkeys without at least the Ctrl modifier!

Looking at you, #thunderbird #signal !

#ux
0
1
2
repeated

Project Zero Bot

New Project Zero issue:

FASTRPC_ATTR_KEEP_MAP logic bug allows fastrpc_internal_munmap_fd to racily free in-use mappings leading to UAF

https://project-zero.issues.chromium.org/issues/42451725

CVE-2024-49848
1
1
2
repeated

We have another bug collision. The Tenable Group used a stack-based buffer overflow to exploit the Lorex 2K camera, but the bug had already been used in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
1
0
repeated

Aargh

Throw the programmers in the sea

30
7
2
repeated

Authenticated! dungdm (@_piers2) with Viettel Cyber Security (@vcslab) used a single Use-After-Free (UAF) bug to exploit the Era 300. The second-round win earns him $30,000 and 6 Master of Pwn points.

0
1
0
repeated

The Synacktiv Team (@Synacktiv) used a combination of 3 different bug to exploit the Ubiquiti AI Bullet. All bugs were unique, so there second round win nets them $15,000 and 3 Master of Pwn points.

0
1
0
Show older