Fisjkars Profile Banner
Maxime Escourbiac Profile
Maxime Escourbiac

@Fisjkars

Followers
257
Following
823
Media
72
Statuses
1K

Red Team Leader @Michelin. #Security Fan de gastronomie

Clermont-Ferrand
Joined July 2010
Don't wanna be here? Send us removal request.
@Fisjkars
Maxime Escourbiac
12 days
#Michelin CERT was credited for CVE-2025-53072 and CVE-2025-62481, two pre-auth RCEs affecting #Oracle E-Business. Both are easy to exploit. Immediate remediation is advised. #security @BleepinComputer @watchtowrcyber
0
1
3
@Fisjkars
Maxime Escourbiac
1 month
Little introduction for my next talk @hack_lu , this article, co-authored with @cousky_ present all details of the full exploit chain that impacted Palo Alto global protect :
Tweet card summary image
blogit.michelin.io
Summary This article delves into vulnerabilities in the Palo Alto GlobalProtect VPN client discovered by Michelin Red Team (Yassine Bengana and Myself) and identified as CVE-2024-5921, CVE-2025-0117,...
0
3
3
@Fisjkars
Maxime Escourbiac
3 months
Michelin CERT striked back. A regression in #PaloAlto Global Protect (CVE-2025-2183) allowed to fully compromise remotely the workstation. All details will be revealed during my talk at @hack_lu.
Tweet card summary image
security.paloaltonetworks.com
An insufficient certificate validation issue in the Palo Alto Networks GlobalProtect™ app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-admini...
0
3
9
@Fisjkars
Maxime Escourbiac
4 months
Excited to be a speaker at @hack_lu! Looking forward to discussing vulnerabilities in VPN clients 🇱🇺 #hacklu #cybersecurity
0
1
4
@Fisjkars
Maxime Escourbiac
9 months
🚨 Michelin Red Team starting the year with a bang! Multiple vulnerabilities discovered in VMware Aria Operations (CVE-2025-22218, 22219, 22220, 22221, 22222) 🔥 Time to patch and stay sharp! 🔗 VMware Advisory: https://t.co/JVKX1L0EXQ #CyberSecurity #RedTeam #VMware #CVE2025
support.broadcom.com
0
1
4
@LiveOverflow
LiveOverflow 🔴
9 months
I guess somebody was thinking outside... the... sand... box! "Compromised renderer can control your mouse and escape sbx" https://t.co/8OWneoaTKi
4
30
197
@Synacktiv
Synacktiv
10 months
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00. https://t.co/nx05pyySC9
synacktiv.com
Microsoft Configuration Manager (ConfigMgr) 2403 Unauthenticated SQL injections
1
65
171
@win3zz
Bipin Jitiya
11 months
Did you know that Java code can be injected into a multiline comment using Unicode escapes (\uXXXX)? It appears as a comment but executes as code. Attackers can use this technique to hide backdoors. Test it yourself to "reveal a hidden message": https://t.co/a3lI6oeV1A
4
95
393
@Doyensec
Doyensec
11 months
Get your mind off the cold 🥶 & check out our new blog post! In it, our @bemodtwz extends @maxenceschmitt's research - giving details on using Eval Villain to find & exploit #CSPT vulnerabilities in modern apps. https://t.co/HAKD2QGMT8 #doyensec #appsec #bugbountytips #Security
3
27
87
@pentest_swissky
Swissky
11 months
🚀 Big Announcement! 🚀 After 8+ years of working on PayloadsAllTheThings, I’m excited to release it as an ebook on Leanpub! 📖✨ To celebrate, I’m gifting 5 free copies to random retweeters! 🔥 👉 Retweet for a chance to win Thank you all for your incredible support! 🙌
Tweet card summary image
leanpub.com
9
146
171
@CERT_FR
CERT-FR
11 months
CERTFR-2024-AVI-1027: Multiples vulnérabilités dans VMware Aria Operations https://t.co/372xW3odAB
0
2
4
@Fisjkars
Maxime Escourbiac
11 months
#Michelin CERT was also acknowledged for discovering CVE-2024-38832 and CVE-2024-38833, which affect VMware Aria Operations. Additional vulnerabilities are still undergoing the disclosure process. https://t.co/zkGj9CjqTQ #security #bugbounty @cousky_
support.broadcom.com
0
2
2
@Fisjkars
Maxime Escourbiac
11 months
#Michelin CERT was acknowledged for identifying CVE-2024-5921, which impacts #PaloAlto GlobalProtect. A detailed report was sent to their PSIRT team on February 26th, demonstrating how to impersonate a legitimate portal and fully compromise a workstation. #security @cousky_
0
1
6
@domenuk
dmnk.bsky.social
1 year
Project Zero blog: LLMs find 0days now! 👀 And: our fuzzer setup did *not* reproduce it! https://t.co/xz6j2fzrWe
8
150
611
@kmcquade3
Kinnaird McQuade 💻☁️💥
1 year
Okta allowing login bypass for any usernames with 52+ characters is insane Official Security Advisory: https://t.co/3b4v30q53z
37
378
2K
@cyb3rops
Florian Roth ⚡️
1 year
Omg … reading this report by @Horizon3Attack on PaloAlto‘s Expedition RCE CVE-2024-9464 (and others) seriously shakes any remaining trust in their software. Every chapter feels like a slap in their face. https://t.co/LOg490bfEL
9
163
550
@dcuthbert
Daniel Cuthbert
1 year
if your commercial app can be owned with this one simple line, then you deserve all the hate. @PaloAltoNtwks this is just, wow I'm lost for words here.
29
148
1K
@Sonar_Research
Sonar Research
1 year
From HTTP request to ROP chain in Node.js! 🔥 Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only: https://t.co/Yw89oZhv32
5
154
485