Pwn2Own Vancouver Returns for the 15th Anniversary of the Contest

Discussion in 'other security issues & news' started by JRViejo, May 10, 2022.

  1. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
     
  2. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
     
  3. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
     
  4. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
  5. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
  6. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Surprising that only one web browser targeted - Firefox with its two bugs.
     
  7. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
    Apple Safari was targeted, but then maybe going after bigger fish?

    Like Microsoft Teams, Oracle Virtualbox, Microsoft Windows 11, Ubuntu Desktop, and Telsa Model 3 Infotainment System, all successes.
     
  8. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Ah yes, I never thought of Safari when I searched browsers using Ctrl-F :D

    Indeed much bigger fish, perhaps with bigger holes to exploit.
     
  9. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,905
    Location:
    U.S.A.
  10. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    It's no surprise to me that they were able to hack just about everything, so Windows, Ubuntu, Safari, Firefox, MS Teams and VirtualBox. However, we shouldn't forget that when it comes to hacking Windows and Ubuntu you will always first need to get malware running on the system, for example via browser exploit, before you can proceed to use privilege elevation bugs in the OS.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.