Jimi Sebree
@DinoBytes
Followers
147
Following
284
Media
2
Statuses
291
I find mediocre bugs and write about them sometimes.
Joined April 2012
Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core https://t.co/GOyasjmYCa
1
63
185
Happy Friday! We're ending the week by publishing our analysis of Fortinet's FortiWeb CVE-2025-25257.... https://t.co/p8v99cD5LG
labs.watchtowr.com
Welcome back to yet another day in this parallel universe of security. This time, we’re looking at Fortinet’s FortiWeb Fabric Connector. “What is that?” we hear you say. That's a great question; no...
9
108
289
Session keys and passwords aplenty, here’s our deep-dive for CVE-2025-5777, aka CitrixBleed 2. Apart from the normal root-cause analysis, we’ve doubled down on actionable steps to investigate Indicators of Compromise. https://t.co/fTfaW1DbJG
2
88
237
CVE-2025-5777, aka #CitrixBleed 2, allows leaking of memory in the response which can allow for compromising session tokens, and other sensitive information. A deep-dive to follow next week.
4
77
298
Checkout our new deep dive on CVE-2025-34508 -- a path traversal vulnerability in #ZendTo. https://t.co/2NY1YdWiks
0
29
48
Our latest blog looks at CVE-2025-20188, an arbitrary file upload in #Cisco IOS XE Wireless Controllers due to a hardcoded credential. https://t.co/XTG5PmnoVh
0
59
116
Check out our latest deep dive into the #Fortinet CVE-2025-32756, a classic buffer overflow! This is being exploited in the wild and was added to the CISA KEV catalog last week. https://t.co/HYNCsIPkMl
2
62
143
We discovered an interesting code injection vulnerability, CVE-2025-3248, affecting #Langflow, a popular agentic AI workflow tool. This enables unauthenticated attackers to fully compromise Langflow servers. https://t.co/o3YQ3fE4XR
0
37
76
Our Indicators of Compromise blog post for CVE-2025-2825, an authentication bypass affecting #CrushFTP. https://t.co/1F0WfFhwlA
1
42
72
New from @Horizon3Attack: There's now a Rapid Response test in #NodeZero for CVE-2025-1974. Affecting #Kubernetes clusters using NGINX Ingress controllers, this vulnerability can allow an unauthenticated attacker with access to the pod network to achieve arbitrary code execution.
0
9
5
🚨 New GreyNoise Tag Alert: We've added a fresh tag tracking CrushFTP Authentication Bypass (CVE-2025-2825) exploitation attempts. Thanks to @Horizon3ai for the intel! Dive into the details:
0
3
4
Confirmed! In his #Pwn2Own debut Evan Grant (@stargravy) used an OS command injection bug to exploit the Kenwood DMX958XR in the last attempt of the contest. His unique approach earns him $10,000 and 2 Master of Pwn points. #P2OAuto
0
4
10
Whew! Evan Grant (@stargravy) needed all but five minutes of his attempt, but he successfully exploited the Kenwood DMX958XR using only his hands, which now must be registered under the Wassenaar arrangement. #Pwn2Own #P2OAuto
1
2
12
Nice! Tenable Researcher used their second attempt to compromise the Lorex 2K Indoor Wi-Fi in the most subtle of way. They head off to the disclosure room with the details. #Pwn2Own #P2OIreland
0
2
3
This was the last thing I found / worked on while still at Tenable. A fun SSRF via Microsoft Copilot Studio leading to a critical info disclosure (CVE-2024-38206). Thanks to @DinoBytes and the team for helping get this one out. https://t.co/VExmmKYgvE
2
24
72
"The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022" by our intern @lanleft_ & her mentor @hi_im_d4rkn3ss Thanks to @bruce30262 for proof-reading it https://t.co/dxy6ooj4zB Sadly the bugs died during registration. :(
starlabs.sg
Background Some time ago, we were playing with some Netgear routers and we learned so much from this target. However, Netgear recently patched several vulnerabilities in their RAX30 router firmware,...
1
33
107
Last minute hotfix for a pwn2own target that literally prevents the device from getting a WAN address might just be more hilarious than it is frustrating. 😆
0
0
6