Tagged in

Vulnerability

Cognite
Cognite
Go deeper into industrial digitalization with stories straight from our developers, engineers, data scientists, and partners. Our contributors are on the frontlines of the global energy transition, industrial transformation, and issues related to cybersecurity and sustainability.
More information
Followers
174
Elsewhere
More, on Medium

Pwn2Own or Not2Pwn, Part 2.5: A brief tale of free 0days

In our first Pwn2Own blog post, we briefly talked about how we discovered a directory traversal vulnerability in less than 20 minutes after reading one of ZDI’s tweets. In this post, we will dive into the technical details of that…