<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with p2oberlin]]></title><description><![CDATA[A list of topics that have been tagged with p2oberlin]]></description><link>https://board.circlewithadot.net/tags/p2oberlin</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:04:42 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/p2oberlin.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Another collision!]]></title><description><![CDATA[Another collision! Although successful on stage, @rewhiles of Viettel Cyber Security (@vcslab) targeting Anthropic Claude Code in the Coding Agent category used a bug that was previously known to the vendor. They still earn $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OBerlin]]></description><link>https://board.circlewithadot.net/topic/48186a4f-d06d-4125-80a0-34dfdad7e3c1/another-collision</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/48186a4f-d06d-4125-80a0-34dfdad7e3c1/another-collision</guid><dc:creator><![CDATA[thezdi@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[While we&#x27;re happy for our prize and that our exploit targeting OpenAI&#x27;s Codex in the Coding Agent category was successful at #PWN2OWN, this was a collision💥 as the bug was previously known to the vendor.]]></title><description><![CDATA[While we're happy for our prize and that our exploit targeting OpenAI's Codex in the Coding Agent category was successful at #PWN2OWN, this was a collision as the bug was previously known to the vendor.  Back to the research! #P2OBerlin #doyensec #appsec #security #ai #openai]]></description><link>https://board.circlewithadot.net/topic/a728aca2-dd42-4d0d-857d-5d977d0587b5/while-we-re-happy-for-our-prize-and-that-our-exploit-targeting-openai-s-codex-in-the-coding-agent-category-was-successful-at-pwn2own-this-was-a-collision-as-the-bug-was-previously-known-to-the-vendor.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/a728aca2-dd42-4d0d-857d-5d977d0587b5/while-we-re-happy-for-our-prize-and-that-our-exploit-targeting-openai-s-codex-in-the-coding-agent-category-was-successful-at-pwn2own-this-was-a-collision-as-the-bug-was-previously-known-to-the-vendor.</guid><dc:creator><![CDATA[doyensec@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[LET&#x27;S GOOO!!!]]></title><description><![CDATA[LET'S GOOO!!! haehae (@haehaeYang) of Out Of Bounds was able to exploit Chroma! If confirmed, they win $20,000 and 2 Master of Pwn points. Now off to the disclosure room. #Pwn2Own #P2OBerlin]]></description><link>https://board.circlewithadot.net/topic/39cc6494-10de-4fc6-af9b-ff14392b8cea/let-s-gooo</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/39cc6494-10de-4fc6-af9b-ff14392b8cea/let-s-gooo</guid><dc:creator><![CDATA[thezdi@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Unfortunately, Interrupt Labs could not get their exploit of NV Container Toolkit working within the time allotted.]]></title><description><![CDATA[Unfortunately, Interrupt Labs could not get their exploit of NV Container Toolkit working within the time allotted. #Pwn2Own #P2OBerlin]]></description><link>https://board.circlewithadot.net/topic/4612b3c6-82d0-4153-b2cf-5c8689f2bba4/unfortunately-interrupt-labs-could-not-get-their-exploit-of-nv-container-toolkit-working-within-the-time-allotted.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/4612b3c6-82d0-4153-b2cf-5c8689f2bba4/unfortunately-interrupt-labs-could-not-get-their-exploit-of-nv-container-toolkit-working-within-the-time-allotted.</guid><dc:creator><![CDATA[thezdi@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[In another video highlight from Day 1 of #Pwn2Own Berlin, Valentina Palmiatti of IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning $50,000 and 5 Master of Pwn points.]]></title><description><![CDATA[In another video highlight from Day 1 of #Pwn2Own Berlin, Valentina Palmiatti of IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning $50,000 and 5 Master of Pwn points. https://youtube.com/shorts/cuJKJaAhPgc #P2OBerlin]]></description><link>https://board.circlewithadot.net/topic/b1b25ac2-1b68-4ce9-b7f4-8e110a02ae3d/in-another-video-highlight-from-day-1-of-pwn2own-berlin-valentina-palmiatti-of-ibm-x-force-offensive-research-xor-used-a-single-bug-to-exploit-nv-container-toolkit-earning-50-000-and-5-master-of-pwn-points.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/b1b25ac2-1b68-4ce9-b7f4-8e110a02ae3d/in-another-video-highlight-from-day-1-of-pwn2own-berlin-valentina-palmiatti-of-ibm-x-force-offensive-research-xor-used-a-single-bug-to-exploit-nv-container-toolkit-earning-50-000-and-5-master-of-pwn-points.</guid><dc:creator><![CDATA[thezdi@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>