Maxime Escourbiac
@Fisjkars
Followers
257
Following
823
Media
72
Statuses
1K
Red Team Leader @Michelin. #Security Fan de gastronomie
Clermont-Ferrand
Joined July 2010
#Michelin CERT was credited for CVE-2025-53072 and CVE-2025-62481, two pre-auth RCEs affecting #Oracle E-Business. Both are easy to exploit. Immediate remediation is advised. #security @BleepinComputer @watchtowrcyber
0
1
3
Little introduction for my next talk @hack_lu , this article, co-authored with @cousky_ present all details of the full exploit chain that impacted Palo Alto global protect :
blogit.michelin.io
Summary This article delves into vulnerabilities in the Palo Alto GlobalProtect VPN client discovered by Michelin Red Team (Yassine Bengana and Myself) and identified as CVE-2024-5921, CVE-2025-0117,...
0
3
3
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain
blogit.michelin.io
Summary This article delves into vulnerabilities in the Palo Alto GlobalProtect VPN client discovered by Michelin Red Team (Yassine Bengana and Myself) and identified as CVE-2024-5921, CVE-2025-0117,...
0
1
3
Michelin CERT striked back. A regression in #PaloAlto Global Protect (CVE-2025-2183) allowed to fully compromise remotely the workstation. All details will be revealed during my talk at @hack_lu.
security.paloaltonetworks.com
An insufficient certificate validation issue in the Palo Alto Networks GlobalProtect™ app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-admini...
0
3
9
Excited to be a speaker at @hack_lu! Looking forward to discussing vulnerabilities in VPN clients 🇱🇺 #hacklu #cybersecurity
0
1
4
🚨 Michelin Red Team starting the year with a bang! Multiple vulnerabilities discovered in VMware Aria Operations (CVE-2025-22218, 22219, 22220, 22221, 22222) 🔥 Time to patch and stay sharp! 🔗 VMware Advisory: https://t.co/JVKX1L0EXQ
#CyberSecurity #RedTeam #VMware #CVE2025
support.broadcom.com
0
1
4
I guess somebody was thinking outside... the... sand... box! "Compromised renderer can control your mouse and escape sbx" https://t.co/8OWneoaTKi
4
30
197
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00. https://t.co/nx05pyySC9
synacktiv.com
Microsoft Configuration Manager (ConfigMgr) 2403 Unauthenticated SQL injections
1
65
171
Did you know that Java code can be injected into a multiline comment using Unicode escapes (\uXXXX)? It appears as a comment but executes as code. Attackers can use this technique to hide backdoors. Test it yourself to "reveal a hidden message": https://t.co/a3lI6oeV1A
4
95
393
#CVE-2024-49194 Databricks JDBC Driver via JAAS, Make JDBC Attack Great Again!! I’ve included the link to my write-up below. Enjoy!! https://t.co/O0i0vGUr8s
blog.pyn3rd.com
Background StoryYesterday, I received a threat intelligence alert regarding the Databricks JDBC driver. After a quick review, I pinpointed the root cause of the issue. The vulnerability stems from imp
4
49
177
Get your mind off the cold 🥶 & check out our new blog post! In it, our @bemodtwz extends @maxenceschmitt's research - giving details on using Eval Villain to find & exploit #CSPT vulnerabilities in modern apps. https://t.co/HAKD2QGMT8
#doyensec #appsec #bugbountytips #Security
3
27
87
🚀 Big Announcement! 🚀 After 8+ years of working on PayloadsAllTheThings, I’m excited to release it as an ebook on Leanpub! 📖✨ To celebrate, I’m gifting 5 free copies to random retweeters! 🔥 👉 Retweet for a chance to win Thank you all for your incredible support! 🙌
leanpub.com
9
146
171
CERTFR-2024-AVI-1027: Multiples vulnérabilités dans VMware Aria Operations https://t.co/372xW3odAB
0
2
4
#Michelin CERT was also acknowledged for discovering CVE-2024-38832 and CVE-2024-38833, which affect VMware Aria Operations. Additional vulnerabilities are still undergoing the disclosure process. https://t.co/zkGj9CjqTQ
#security #bugbounty @cousky_
support.broadcom.com
0
2
2
Project Zero blog: LLMs find 0days now! 👀 And: our fuzzer setup did *not* reproduce it! https://t.co/xz6j2fzrWe
8
150
611
Okta allowing login bypass for any usernames with 52+ characters is insane Official Security Advisory: https://t.co/3b4v30q53z
37
378
2K
Omg … reading this report by @Horizon3Attack on PaloAlto‘s Expedition RCE CVE-2024-9464 (and others) seriously shakes any remaining trust in their software. Every chapter feels like a slap in their face. https://t.co/LOg490bfEL
9
163
550
if your commercial app can be owned with this one simple line, then you deserve all the hate. @PaloAltoNtwks this is just, wow I'm lost for words here.
29
148
1K
From HTTP request to ROP chain in Node.js! 🔥 Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only: https://t.co/Yw89oZhv32
5
154
485