The Blog

Welcome to Cenobe's Tech Intelligence Hub. Here, we share our expertise in offensive cybersecurity through in-depth technical analyses, research & development findings, and compliance insights.

Article 01

Redirect-based OAuth Token Exposure in Bitbucket Integrations

An OAuth redirection-based access token leak affecting users of ONA who authenticated using Bitbucket was discovered. The attack relies on several technical details across ONA, Bitbucket, and browser behavior.

logo
Cyber Security
Article 01

Exploiting SAP Crystal Report’s Vulnerability in 2025

In 2020, SAP disclosed CVE-2020-6219, a deserialization-based Remote Code Execution (RCE) vulnerability in the Crystal Report Viewer. Fast forward to 2025, and we revisited this flaw developing a practical exploitation path that highlights just how dangerous it remains in real-world scenarios.

logo
Cyber Security
Article 01

How Gitpod Strengthened Its Security Posture with Cenobe

Learn how a collaborative security assessment approach helped Gitpod transform their vulnerability management and build greater confidence in their products.

logo
Cyber Security
Article 01

Our Research Story: Unauthenticated RCE in Ametys CMS 4.7.x

Our Research Story: Unauthenticated RCE in Ametys CMS 4.7.x

logo
Cyber Security
Article 01

The Truth Behind Apache Tomcat’s CVE-2025-24813: Why Exploitation Isn’t Simple

CVE-2025-24813 has been making headlines with a critical 9.8 CVSS score, raising concerns across the industry. But after diving deep into its internals, our R&D team came to a different conclusion: this vulnerability is far harder to exploit than it seems.

logo
Cyber Security
Article 01
  • CVES

CVE-2025-27407: Inside the Critical GraphQL-Ruby RCE Vulnerability

How a popular Ruby gem exposed thousands of applications to remote code execution. A technical analysis of the vulnerability that affected major platforms worldwide.

logo
Cyber Security