Pwn2Own or Not2Pwn, Part 2.5: A brief tale of free 0days
In our first Pwn2Own blog post, we briefly talked about how we discovered a directory traversal vulnerability in less than 20 minutes after reading one of ZDI’s tweets. In this post, we will dive into the technical details of that…