{"id":2574,"date":"2025-05-18T07:35:20","date_gmt":"2025-05-18T07:35:20","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=2574"},"modified":"2025-05-18T07:35:20","modified_gmt":"2025-05-18T07:35:20","slug":"vmware-esxi-firefox-purple-hat-linux-sharepoint-hacked","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=2574","title":{"rendered":"VMware ESXi, Firefox, Purple Hat Linux &#038; SharePoint Hacked"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Safety researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering vital vulnerabilities throughout main enterprise platforms and incomes $435,000 in bounties. <\/p>\n<p>The competitors, now in its second day on the OffensiveCon convention in Berlin, has awarded a cumulative whole of $695,000 with members revealing 20 distinctive <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/google-reports-75-zero-day-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day vulnerabilities<\/a> to this point. <\/p>\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"\/>\n<p>With a 3rd day of competitors remaining, organizers imagine the overall prize cash may surpass the $1 million threshold.<\/p>\n<div class=\"td-a-ad id_inline_ad0 id_ad_content-horiz-center\"><span class=\"td-adspot-title\">&#8211; Commercial &#8211;<\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgtF4v5Ejzb9hD6O8UG7KJJziqO1ZP5zcUuKXNsyjb4g3FugqSKlBjBKmUNqGCjtqOq8kEb1lM6uZOBXm0lUCSTqXKyP4hz81q77L_k5I4RBy3afKYWuunQXOVo9zA4MFlD75XmYOjxT0sNIO9RR8UZPin1ZBVShx5Xj-5D9SyEp0QgEPoA6vxXp3Q4DInb\/s16000\/Don%E2%80%99t%20miss%20our%20latest%20stories%20on%20Google%20News%20(1).png&#10;\" alt=\"Google News\"\/><\/a><\/div>\n<h2 class=\"wp-block-heading\" id=\"major-enterprise-systems-fall-to-skilled-hackers\"><strong>Main Enterprise Techniques Fall to Expert Hackers<\/strong><\/h2>\n<p>The second day of the competitors noticed a number of high-profile enterprise platforms efficiently compromised. <\/p>\n<p>In what marks a historic achievement, Dinh Ho Anh Khoa of Viettel Cyber Safety mixed an authentication bypass with an insecure deserialization bug to take advantage of Microsoft SharePoint, incomes $100,000 and 10 Grasp of Pwn factors. <\/p>\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"\/>\n<p>As a widely-deployed collaboration platform in company environments, this <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/cisa-warns-hackers-exploiting-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">SharePoint vulnerability<\/a> represents a major safety threat for organizations worldwide.<\/p>\n<p>The competitors additionally witnessed profitable exploits in opposition to different vital enterprise software program. <\/p>\n<p>Based on the competition outcomes, STAR Labs has established a commanding lead within the Grasp of Pwn rankings that appears unlikely to be overcome. <\/p>\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"\/>\n<p>The primary day had already seen the Star Labs group earn the very best single reward of $60,000 for an exploit chain involving a Linux kernel vulnerability that allowed them to flee Docker Desktop and execute code on the underlying working system.<\/p>\n<h2 class=\"wp-block-heading\" id=\"ai-security-category-draws-significant-attention\"><strong>AI Safety Class Attracts Vital Consideration<\/strong><\/h2>\n<p>The newly launched AI class at Pwn2Own Berlin 2025 continues to draw profitable exploits from safety researchers. <\/p>\n<p>This inaugural Berlin version marks the primary time the competitors has included devoted AI safety targets, reflecting rising considerations about vulnerabilities in rising AI applied sciences.<\/p>\n<p>On the primary day, Sina Kheirkhah of the Summoning Group made historical past because the first-ever winner within the AI class, incomes $20,000 for an exploit concentrating on the Chroma open-source AI software database.<\/p>\n<p>The identical researcher earned an extra $15,000 for efficiently hacking an NVIDIA Triton Inference Server, although it was marked as a \u2018collision\u2019 as a result of the seller had prior information of the bug however hadn\u2019t but patched it.<\/p>\n<p>The AI class was particularly designed to transcend easy immediate injections, requiring members to attain full code execution on AI frameworks. <\/p>\n<p>\u201cAs a result of that is our first bounty class targeted on AI infrastructure, we totally count on new and probably important vulnerabilities to floor,\u201d <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.zerodayinitiative.com\/blog\/2025\/5\/15\/pwn2own-berlin-2025-day-one-results\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">famous Development Micro<\/a>, which organizes the occasion by means of its Zero Day Initiative. <\/p>\n<p>\u201cThat\u2019s the purpose. Our objective is to supply and financially compensate researchers to coordinate their findings with distributors to reveal this earlier than dangerous actors take benefit.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"competition-highlights-collaborative-security-appr\"><strong>Competitors Highlights Collaborative Safety Strategy<\/strong><\/h2>\n<p>Day Two additionally noticed a number of \u201ccollision\u201d exploits, the place researchers demonstrated vulnerabilities that had been already recognized to distributors however remained unpatched. <\/p>\n<p>As an example, Mohand Acherir and Patrick Ventuzelo of FuzzingLabs exploited NVIDIA Triton, incomes $15,000 regardless of NVIDIA already realizing concerning the vulnerability.<\/p>\n<p>The competitors underscores the significance of accountable disclosure in cybersecurity. <\/p>\n<p>All vulnerabilities demonstrated throughout the contest are disclosed to distributors, who sometimes have 90 days to launch safety fixes earlier than publishing technical particulars.<\/p>\n<p>This collaborative strategy between safety researchers and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/ottercookie-attack-job-offers\/\" target=\"_blank\" rel=\"noreferrer noopener\">software program builders<\/a> helps strengthen the general safety panorama.<\/p>\n<p>\u201cPwn2Own isn\u2019t nearly breaking issues; it\u2019s about constructing a greater cybersecurity panorama,\u201d defined Development Micro. <\/p>\n<p>\u201cBy bringing researchers and distributors collectively in a coordinated, public discussion board, we speed up the trail from vulnerability discovery to patch, making certain speedy safety\u201d.<\/p>\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Confirmed! Valentina Palmiotti (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/chompie1337?ref_src=twsrc%5Etfw\">@chompie1337<\/a>) with IBM X-Drive used an Improper Replace of Reference Rely bug to escalate privileges on Home windows 11. She nailed her first <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/Pwn2Own?src=hash&amp;ref_src=twsrc%5Etfw\">#Pwn2Own<\/a> occasion and walks away with $15,000 and three Grasp of Pwn factors. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/t.co\/AwwyOxz1Dr\">pic.twitter.com\/AwwyOxz1Dr<\/a><\/p>\n<p>\u2014 Development Zero Day Initiative (@thezdi) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/thezdi\/status\/1770969952863793318?ref_src=twsrc%5Etfw\">March 22, 2024<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>The third and closing day of competitors continues on Might 17, with researchers concentrating on the remaining methods together with Home windows 11, Oracle VirtualBox, VMware merchandise, Mozilla Firefox, and NVIDIA methods.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong><strong>Discover this Information Fascinating! Comply with us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, &amp;\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Prompt Updates!<\/strong><\/strong><\/p>\n<\/div>\n<p><template id="ZvApwYZCq0XZLOXsuPQT"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Safety researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering vital vulnerabilities throughout main enterprise platforms and incomes $435,000 in bounties. The competitors, now in its second day on the OffensiveCon convention in Berlin, has awarded a cumulative whole of $695,000 with members revealing 20 distinctive zero-day vulnerabilities to this point. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2576,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2499,2500,173,2502,2026,2501,2503,2498],"class_list":["post-2574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-esxi","tag-firefox","tag-hacked","tag-hat","tag-linux","tag-red","tag-sharepoint","tag-vmware"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2574"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2574\/revisions"}],"predecessor-version":[{"id":2575,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2574\/revisions\/2575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/2576"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 21:11:15 UTC -->