Simon Scannell

@scannell_simon

I like to learn by breaking things. Vulnerability Research

~
Joined October 2018

Tweets

You blocked @scannell_simon

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @scannell_simon

  1. Pinned Tweet
    Jan 1
    Undo
  2. Retweeted

    The plural of regex is regrets

    Undo
  3. Retweeted
    Aug 12

    MyBB fixed a Persistent XSS (CVE-2021-27279) in MyBB < 1.8.25 found by our researcher Igor Sak-Sakovskiy. RCE is possible when chained with CVE-2021-27890, reported by Simon Scannell & Carl Smith. Advisory:

    Show this thread
    Undo
  4. Retweeted
    Aug 5

    Tired of hopping between boring programs? We are looking for full-time and vulnerability researchers to join our R&D team and uncover impactful bugs in popular open-source projects:

    Undo
  5. Retweeted
    Aug 2

    We are excited that our security researchers and are honored with a nomination for this year's ... - Best Client-Side Bug (RCE through CS:GO) - Best Privilege Escalation Bug (CVE-2020-27194) - Most Under-Hyped Research (Composer)

    Undo
  6. Retweeted
    Jul 29

    So excited to finally release my blog post- Kernel Pwning with eBPF: a Love Story. I cover eBPF, the verifier, debugging, exploitation, mitigations and other cool findings! I do root cause analysis and exploit CVE-2021-3490 for LPE with PoC included.

    Show this thread
    Undo
  7. Retweeted
    Jul 28

    We discovered a and code vulnerability in Zimbra webmail that could enable attackers to steal all emails of an organization by sending one malicious email. Learn more in our new blog post:

    Undo
  8. Jul 27

    Really happy to have published something again, especially web stuff! pre-auth Stored XSS in email body + SSRF

    Undo
  9. Retweeted
    Jul 14

    Yet another Linux kernel exploitation write-up! CVE-2021-22555: Turning \x00\x00 into 10000$

    Undo
  10. Retweeted
    May 18

    My first blog post as a vulnerability researcher is up 🎉 Check it out to learn about blind and error-based NoSQL injections in RocketChat that ended up giving me RCE!

    Undo
  11. Retweeted
    May 16
    Undo
  12. Retweeted
    May 15

    I've written multiple OSes, dozens of compilers, and even developed entirely new algorithms. I'm a high-school dropout.

    Undo
  13. May 14

    Really happy to publish something again. I have to admit I'm proud of the info leak, it enabled the exploit to be 100% reliable. We might publish the exploit code soon

    Undo
  14. Retweeted
    Apr 27
    Undo
  15. Retweeted
    Apr 13
    Undo
  16. Retweeted
    Apr 12

    I wonder if it's possible to challenge H1 legally for enforcing unlimited NDA on those bug reports while never acting on them? do you know of any precedent?

    Show this thread
    Undo
  17. Retweeted
    Apr 12

    Valve ignoring security researchers is not just specific to the secret club. Here we see Bien Pham demonstrate his Remote Code Execution exploit that has not been patched for over a year.

    Undo
  18. Retweeted
    Apr 11

    Two years ago, slidybat reported a remote code execution affecting Team Fortress 2. It can be triggered by joining a community server. It has yet to be patched.

    Show this thread
    Undo
  19. Apr 10

    looking forward to the blog post on this one, should it ever be fixed! :)

    Undo
  20. Retweeted
    Mar 18

    MyBB Remote Code Execution Chain (CVE-2021-27889, CVE-2021-27890) A guest post by our research friends and who found critical code vulnerabilities in the MyBB forum.

    Undo
  21. Retweeted
    Jan 29

    I were able in collaboration with to create a working Proof of Concept exploit for the new sudo CVE-2021-3156. Tested just in Ubuntu 20.04.1 LTS, in other distros offsets may change. PoC available:

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·