Connect with us

Hi, what are you looking for?



Researchers Awarded $552,500 at Pwn2Own 2015

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

Researchers who took part in the Pwn2Own 2015 hacking competition at the CanSecWest security conference have earned a total of $552,500, plus non-monetary prizes such as laptops and Zero Day Initiative (ZDI) points.

On the first day of the event, participants received a total of $317,500 after presenting three bugs in Adobe Flash, three bugs in Adobe Reader, three bugs in Windows, two bugs in Mozilla Firefox, and two bugs in Internet Explorer. On the second day, researchers got $235,000 for two flaws in Windows, two flaws in Internet Explorer, one flaw in Firefox, two flaws in Apple Safari, and one flaw in Google Chrome.

Day two started with an attack on Firefox. The researcher ilxu1a found an out-of-bounds read/write vulnerability leading to a medium-integrity code execution, for which he received $15,000. At the end of the day, ilxu1a also attempted to hack Chrome, but he ran out of time before he could get the exploit to work.

JungHoon Lee (lokihardt) was the best competitor this year with a total reward of $225,000. He hacked Chrome (both the stable and beta versions), Internet Explorer, and Safari.

The Chrome attack earned him a total of $110,000, which is the single biggest payout in Pwn2Own history, according to HP. The expert broke the web browser by exploiting a buffer overflow race condition in Chrome, and an info leak and a race condition in two Windows kernel drivers for system privileges.

“This is an amazing accomplishment for anyone, but it’s especially impressive considering he is an individual competitor rather than a team. Well done,” Dustin Childs of HP Security Research said in a blog post.

Lee cracked Internet Explorer with a time-of-check to time-of-use (TOCTOU) vulnerability, and Safari with a use-after-free flaw in an uninitialized stack pointer and a sandbox bypass.

Advertisement. Scroll to continue reading.

All of the 21 vulnerabilities used at Pwn2Own have been disclosed to the affected vendors, which, according to HP, are working on fixing the issues.

The total payout at Pwn2Own 2015 was smaller compared to the previous year when HP and the other sponsors awarded participants $850,000 of the total prize pool of $1,085,000.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.