#react2shell resultados da pesquisa

TRU is tracking active exploitation of #React2Shell and released an advisory with observables/indicators. Observed activity includes system reconnaissance and attempts to exfiltrate AWS credentials. esentire.com/security-advis…

YungBinary's tweet image. TRU is tracking active exploitation of #React2Shell and released an advisory with observables/indicators. 

Observed activity includes system reconnaissance and attempts to exfiltrate AWS credentials.

esentire.com/security-advis…
YungBinary's tweet image. TRU is tracking active exploitation of #React2Shell and released an advisory with observables/indicators. 

Observed activity includes system reconnaissance and attempts to exfiltrate AWS credentials.

esentire.com/security-advis…

While looking for #React2Shell with @Rohan_Lew we identified a critical SSRF flaw that enabled extraction of AWS metadata — a serious cloud-security exposure. #bugbounty #Hacking #InfoSec #EthicalHacking #cybersecurity

atif2816's tweet image. While looking for #React2Shell with @Rohan_Lew  we identified a critical SSRF flaw that enabled extraction of AWS metadata — a serious cloud-security exposure.

#bugbounty #Hacking #InfoSec #EthicalHacking #cybersecurity

just tested this in-memory backdoor via #React2Shell, this is crazy. github.com/Malayke/Next.j… I don't have time to set up a honeypot right now, but I'm pretty sure it would catch these kind of requests within minutes. :)

an0n_r0's tweet image. just tested this in-memory backdoor via #React2Shell, this is crazy. github.com/Malayke/Next.j… I don't have time to set up a honeypot right now, but I'm pretty sure it would catch these kind of requests within minutes. :)

nobody care about it? #React2Shell

imraax's tweet image. nobody care about it?
#React2Shell

Scanning for CVE-2025-55182 using @pdnuclei 🚨 If you're running Next.js / React, scan your apps now. Nuclei Template - cloud.projectdiscovery.io/library/CVE-20… Vulnerability Advisory - react.dev/blog/2025/12/0… #nextjs #cybersecurity #react2shell

pdnuclei's tweet image. Scanning for CVE-2025-55182 using @pdnuclei 🚨

If you're running Next.js / React, scan your apps now.

Nuclei Template - cloud.projectdiscovery.io/library/CVE-20…

Vulnerability Advisory - react.dev/blog/2025/12/0…

#nextjs #cybersecurity #react2shell

try this WAF bypass trick for rsc&&next.js CVE-2025-55182 All fields can use utf16le charset #React2Shell

phithon_xg's tweet image. try this WAF bypass trick for rsc&&next.js CVE-2025-55182
All fields can use utf16le charset
#React2Shell

React2Shell is not fixed for many teams. RSC and the Next.js App Router need another look. One Flight frame can still reach your server runtime. Full write up: strobes.co/blog/react2she… #React2Shell #CVE2025 #NextJS #RSC #AppSec #VulnerabilityManagement

StrobesHQ's tweet image. React2Shell is not fixed for many teams.
RSC and the Next.js App Router need another look.
One Flight frame can still reach your server runtime.
Full write up: strobes.co/blog/react2she…
#React2Shell #CVE2025 #NextJS #RSC #AppSec #VulnerabilityManagement

My #llmHunter in action, trying to bypass Vercel's WAF for #React2Shell 🤞🤞🤞

Vercel Platform Protection started using @Hacker0x01 today: hackerone.com/vercel_platfor… , pays: 100$ min. #hackerone #bugbounty



The React2shell bypass technique leverages various features of JSON and JavaScript, and the Flight Protocol can also be utilized for obfuscation. In Figure 3, which demonstrates bypassing a certain WAF, can you identify how many tricks are used? #React2Shell #CVE-2025-55182

D0n9D0n9's tweet image. The React2shell bypass technique leverages various features of JSON and JavaScript, and the Flight Protocol can also be utilized for obfuscation. In Figure 3, which demonstrates bypassing a certain WAF, can you identify how many tricks are used?
#React2Shell #CVE-2025-55182
D0n9D0n9's tweet image. The React2shell bypass technique leverages various features of JSON and JavaScript, and the Flight Protocol can also be utilized for obfuscation. In Figure 3, which demonstrates bypassing a certain WAF, can you identify how many tricks are used?
#React2Shell #CVE-2025-55182
D0n9D0n9's tweet image. The React2shell bypass technique leverages various features of JSON and JavaScript, and the Flight Protocol can also be utilized for obfuscation. In Figure 3, which demonstrates bypassing a certain WAF, can you identify how many tricks are used?
#React2Shell #CVE-2025-55182

Detecting #React2Shell (CVE-2025-55182), Safe probe for Flight parser error with Curl and without harmful execution. Indicators of vulnerability: ✅ Response Code = 500 ✅ Word "digest" appears in response body #React2Shell #CVE202555182 #BugBounty

arshiyaiha's tweet image. Detecting #React2Shell (CVE-2025-55182), Safe probe for Flight parser error with Curl and without harmful execution.
Indicators of vulnerability:
✅ Response Code = 500
✅ Word "digest" appears in response body
#React2Shell #CVE202555182 #BugBounty

the person who discovered the #react2shell vulnerability should get paid $1m


[1] CVE-2025-66478 exploited in the wild. Following up on Tyler Hudak post on #React2Shell, I found a log file from a compromised Next.js app. Cryptominer runs 3-stage attack: kill competitors, deploy miner, persist with watchdog. lnkd.in/dftjCX49

MalGamy12's tweet image. [1] CVE-2025-66478 exploited in the wild. Following up on Tyler Hudak post on #React2Shell, I found a log file from a compromised Next.js app. Cryptominer runs 3-stage attack: kill competitors, deploy miner, persist with watchdog. lnkd.in/dftjCX49
MalGamy12's tweet image. [1] CVE-2025-66478 exploited in the wild. Following up on Tyler Hudak post on #React2Shell, I found a log file from a compromised Next.js app. Cryptominer runs 3-stage attack: kill competitors, deploy miner, persist with watchdog. lnkd.in/dftjCX49
MalGamy12's tweet image. [1] CVE-2025-66478 exploited in the wild. Following up on Tyler Hudak post on #React2Shell, I found a log file from a compromised Next.js app. Cryptominer runs 3-stage attack: kill competitors, deploy miner, persist with watchdog. lnkd.in/dftjCX49
MalGamy12's tweet image. [1] CVE-2025-66478 exploited in the wild. Following up on Tyler Hudak post on #React2Shell, I found a log file from a compromised Next.js app. Cryptominer runs 3-stage attack: kill competitors, deploy miner, persist with watchdog. lnkd.in/dftjCX49

You can now scan for #react2shell in @Burp_Suite. To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to @assetnote for sharing a reliable detection technique!

albinowax's tweet image. You can now scan for #react2shell in @Burp_Suite. To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to @assetnote for sharing a reliable detection technique!

On vdp program I hope no one has reported this before.😄 #React2Shell #BugBounty #bugbountytips #bug

mark_443_'s tweet image. On vdp program 
I hope no one has reported this before.😄
#React2Shell #BugBounty #bugbountytips #bug

Nenhum resultado para "#react2shell"
Nenhum resultado para "#react2shell"
Nenhum resultado para "#react2shell"
Loading...

Something went wrong.


Something went wrong.


United States Trends