Pwn2Own Berlin 2026 - Day Two Results

May 15, 2026 | Dustin Childs

Day Two of Pwn2Own Berlin 2026 is underway and the stakes continue to rise! Security researchers are back on the Pwn2Own stage, pushing enterprise systems to their limits as the competition heats up. More exploits, more surprises, and more standout moments are unfolding, so follow along here for live updates as the race for Master of Pwn intensifies.

Yesterday, we awarded $523,000 for 24 unique 0-days, and DEVCORE has a commanding lead in the Master of Pwn points. However, there are plenty of big targets on the schedule today, including SharePoint, Exchange, and Safari. Here’s how the Master of Pwn rankings sit on the beginning of Day Two:

We’ll be posting real-time updates and results throughout the competition right here on our blog and across social media. Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Berlin and #P2OBerlin for continuous coverage. 

FAILURE - Unfortunately, Tao Yan & Edouard Bochin of Palo Alto Networks could not get their exploit of Apple Safari – Renderer Only working within the time allotted.

FAILURE - Unfortunately, Stephen Fewer of Rapid7 could not get their exploit of Microsoft SharePoint working within the time allotted.