Jimi Sebree Profile
Jimi Sebree

@DinoBytes

Followers
147
Following
284
Media
2
Statuses
291

I find mediocre bugs and write about them sometimes.

Joined April 2012
Don't wanna be here? Send us removal request.
@Horizon3Attack
Horizon3 Attack Team
6 months
Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core https://t.co/GOyasjmYCa
1
63
185
@Horizon3Attack
Horizon3 Attack Team
7 months
Session keys and passwords aplenty, here’s our deep-dive for CVE-2025-5777, aka CitrixBleed 2. Apart from the normal root-cause analysis, we’ve doubled down on actionable steps to investigate Indicators of Compromise. https://t.co/fTfaW1DbJG
2
88
237
@Horizon3Attack
Horizon3 Attack Team
7 months
CVE-2025-5777, aka #CitrixBleed 2, allows leaking of memory in the response which can allow for compromising session tokens, and other sensitive information. A deep-dive to follow next week.
4
77
298
@Horizon3Attack
Horizon3 Attack Team
8 months
Checkout our new deep dive on CVE-2025-34508 -- a path traversal vulnerability in #ZendTo. https://t.co/2NY1YdWiks
0
29
48
@Horizon3Attack
Horizon3 Attack Team
8 months
Our latest blog looks at CVE-2025-20188, an arbitrary file upload in #Cisco IOS XE Wireless Controllers due to a hardcoded credential. https://t.co/XTG5PmnoVh
0
59
116
@Horizon3Attack
Horizon3 Attack Team
8 months
Check out our latest deep dive into the #Fortinet CVE-2025-32756, a classic buffer overflow! This is being exploited in the wild and was added to the CISA KEV catalog last week. https://t.co/HYNCsIPkMl
2
62
143
@Horizon3Attack
Horizon3 Attack Team
10 months
Just finished reproducing CVE-2025-32433 and putting together a quick PoC exploit — surprisingly easy. Wouldn’t be shocked if public PoCs start dropping soon. If you’re tracking this, now’s the time to take action. #Erlang #SSH
13
136
433
@Horizon3Attack
Horizon3 Attack Team
10 months
We discovered an interesting code injection vulnerability, CVE-2025-3248, affecting #Langflow, a popular agentic AI workflow tool. This enables unauthenticated attackers to fully compromise Langflow servers. https://t.co/o3YQ3fE4XR
0
37
76
@Horizon3Attack
Horizon3 Attack Team
10 months
Our Indicators of Compromise blog post for CVE-2025-2825, an authentication bypass affecting #CrushFTP. https://t.co/1F0WfFhwlA
1
42
72
@Horizon3ai
Horizon3.ai
10 months
New from @Horizon3Attack: There's now a Rapid Response test in #NodeZero for CVE-2025-1974. Affecting #Kubernetes clusters using NGINX Ingress controllers, this vulnerability can allow an unauthenticated attacker with access to the pod network to achieve arbitrary code execution.
0
9
5
@GreyNoiseIO
GreyNoise
10 months
🚨 New GreyNoise Tag Alert: We've added a fresh tag tracking CrushFTP Authentication Bypass (CVE-2025-2825) exploitation attempts. Thanks to @Horizon3ai for the intel! Dive into the details:
0
3
4
@thezdi
TrendAI Zero Day Initiative
1 year
Confirmed! In his #Pwn2Own debut Evan Grant (@stargravy) used an OS command injection bug to exploit the Kenwood DMX958XR in the last attempt of the contest. His unique approach earns him $10,000 and 2 Master of Pwn points. #P2OAuto
0
4
10
@thezdi
TrendAI Zero Day Initiative
1 year
Whew! Evan Grant (@stargravy) needed all but five minutes of his attempt, but he successfully exploited the Kenwood DMX958XR using only his hands, which now must be registered under the Wassenaar arrangement. #Pwn2Own #P2OAuto
1
2
12
@thezdi
TrendAI Zero Day Initiative
1 year
Nice! Tenable Researcher used their second attempt to compromise the Lorex 2K Indoor Wi-Fi in the most subtle of way. They head off to the disclosure room with the details. #Pwn2Own #P2OIreland
0
2
3
@stargravy
evan
1 year
This was the last thing I found / worked on while still at Tenable. A fun SSRF via Microsoft Copilot Studio leading to a critical info disclosure (CVE-2024-38206). Thanks to @DinoBytes and the team for helping get this one out. https://t.co/VExmmKYgvE
2
24
72
@starlabs_sg
starlabs
3 years
"The Last Breath of Our Netgear RAX30 Bugs - A Tragic Tale before Pwn2Own Toronto 2022" by our intern @lanleft_ & her mentor @hi_im_d4rkn3ss Thanks to @bruce30262 for proof-reading it https://t.co/dxy6ooj4zB Sadly the bugs died during registration. :(
Tweet card summary image
starlabs.sg
Background Some time ago, we were playing with some Netgear routers and we learned so much from this target. However, Netgear recently patched several vulnerabilities in their RAX30 router firmware,...
1
33
107
@thezdi
TrendAI Zero Day Initiative
3 years
For those interested in #Pwn2Own Toronto, please be aware that #Netgear and others have updated. Now is a good time to check and make sure your exploit still hits. We know some entries have been patched out. May the odds be ever in your favor.
1
4
24
@DinoBytes
Jimi Sebree
3 years
Last minute hotfix for a pwn2own target that literally prevents the device from getting a WAN address might just be more hilarious than it is frustrating. 😆
0
0
6