Pwn2Own Berlin 2026: Day Three Results and Master of Pwn
Welcome to the third and final day of Pwn2Own Berlin 2026! Over the past two days, some amazing research has been put on display, and today looks just as intense. So far, we have awarded $908,750 for 39 unique zero days. With SharePoint and ESXi as targets today, the chances are excellent for crossing the million-dollar threshold. Here are the Master of Pwn standings as we begin the day:
Introduction to Malware Binary Triage (IMBT) Course
Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.
Enroll Now and Save 10%: Coupon Code MWNEWS10
Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.
<img alt="" height="1080" src="https://images.squarespace-cdn.com/content/v1/5894c269e4fcb5e65a1ed623/f80d3f22-4a63-4613-9848-084abbe47aab/Day+Two_P2O-Berlin+2026+Master+of+Pwn+Leaderboard.jpg?format=1000w" width="1920" />
Let's get to the results of Day Three:
SUCCESS/COLLISION - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used two bugs to exploit Red Hat Linux, but one of the bugs was previously known. He still earns $7,000 and 1.5 Master of Pwn points.
Article Link: Zero Day Initiative — Pwn2Own Berlin 2026: Day Three Results and Master of Pwn
1 post - 1 participant
Malware Analysis, News and Indicators - Latest topics