Peter Girnus
@gothburz
Sr. Threat Researcher @theZDI 🥷🏻🛡️👨🏼💻Threat hunter of vulnerabilities & other #infosec threats 🎯 Creator of @cybercronai 🤖📊 opinions my own 💭
ID: 941820928274681856
https://petergirnus.com 16-12-2017 00:03:02
6,6K Tweet
12,12K Takipçi
368 Takip Edilen
Wait until Department of War 🇺🇸 hear’s about the MAPP program leak and CVE-2025-53770.
CVE-2025-23298: Trend ZDI's Petrus Germanicus covers an RCE in the #NVIDIA Merlin Transformers4Rec library. He details the root cause and the patch to fix it. Finally, he highlights highlights several important lessons for the AI/ML security community. zerodayinitiative.com/blog/2025/9/23…
Real G's use ArchLinux Arch Linux Memes
[ZDI-25-930|CVE-2025-11202] win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Peter Girnus (Petrus Germanicus) of Trend Research) zerodayinitiative.com/advisories/ZDI…
[ZDI-25-932|CVE-2025-11200] MLflow Weak Password Requirements Authentication Bypass Vulnerability (CVSS 8.1; Credit: Peter Girnus (Petrus Germanicus) of Trend Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. zerodayinitiative.com/blog/2025/10/6…