Peter Girnus (@gothburz) 's Twitter Profile
Peter Girnus

@gothburz

Sr. Threat Researcher @theZDI 🥷🏻🛡️👨🏼‍💻Threat hunter of vulnerabilities & other #infosec threats 🎯 Creator of @cybercronai 🤖📊 opinions my own 💭

ID: 941820928274681856

linkhttps://petergirnus.com calendar_today16-12-2017 00:03:02

6,6K Tweet

12,12K Takipçi

368 Takip Edilen

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Great to see Trend ZDI researchers Jonathan Andersson  and Thanos Kaliyanakis present their findings on EV Charger security. We heard things got a bit flammable. #Blackhat

Great to see Trend ZDI researchers Jonathan Andersson  and Thanos Kaliyanakis present their findings on EV Charger security. We heard things got a bit flammable. #Blackhat
Peter Girnus (@gothburz) 's Twitter Profile Photo

The continued lack of basic security considerations for AI workflow tools, mcp servers, and orchestrators is disgusting... CVE-2025-59528 - RCE in Flowise - CVSS 10.

The continued lack of basic security considerations for AI workflow tools, mcp servers, and orchestrators is disgusting...

CVE-2025-59528 - RCE in Flowise - CVSS 10.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

CVE-2025-23298: Trend ZDI's Petrus Germanicus covers an RCE in the #NVIDIA Merlin Transformers4Rec library. He details the root cause and the patch to fix it. Finally, he highlights highlights several important lessons for the AI/ML security community. zerodayinitiative.com/blog/2025/9/23…

Peter Girnus (@gothburz) 's Twitter Profile Photo

I uncovered a critical vuln in NVIDIA’s Transformers4Rec, allowing RCE via unsafe pickle deserialization. Read about the exploit, patch analysis, and why ML/AI deserialization vulnerabilities are still a thing in 2025! 🔐💻

Peter Girnus (@gothburz) 's Twitter Profile Photo

CVE-2025-59828: Be sure to update your claude-code installs! Bypass of the directory trust dialog. Anthropic github.com/anthropics/cla…

CVE-2025-59828: Be sure to update your claude-code installs! Bypass of the directory trust dialog. <a href="/AnthropicAI/">Anthropic</a> github.com/anthropics/cla…
Peter Girnus (@gothburz) 's Twitter Profile Photo

I created a PoC for CVE-2025-10725 - Red Hat Openshift AI Service - Patch this ASAP! bugzilla.redhat.com/show_bug.cgi?i…

I created a PoC for CVE-2025-10725 - Red Hat Openshift AI Service - Patch this ASAP!
bugzilla.redhat.com/show_bug.cgi?i…
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-930|CVE-2025-11202] win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Peter Girnus (Petrus Germanicus) of Trend Research) zerodayinitiative.com/advisories/ZDI…

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-932|CVE-2025-11200] MLflow Weak Password Requirements Authentication Bypass Vulnerability (CVSS 8.1; Credit: Peter Girnus (Petrus Germanicus) of Trend Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…

Faith 🇧🇩🇦🇺 (@farazsth98) 's Twitter Profile Photo

Finished writing the blog post. I'll link it below. I left out the bug that ZDI rejected from the post, as it's still an unpatched 0-day (I did add some details about it though😉). It never got reported to Oracle at the time due to the rejection. Link below in the reply tweet!

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. zerodayinitiative.com/blog/2025/10/6…

benny isaacs (@benny_isaacs) 's Twitter Profile Photo

🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell Hexacon

🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE.
Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation.
See you on Friday 👋
#Redis #Security #RediShell
<a href="/hexacon_fr/">Hexacon</a>
Peter Girnus (@gothburz) 's Twitter Profile Photo

Exactly, you assigned a CVE to a vulnerability. Downplaying a CVE and calling it merely and issue is at best disingenuous and worst outright manipulative.