Explore tweets tagged as #Log4Shell
@futurevuls
FutureVuls-SSVC搭載の脆弱性管理クラウド
5 days
🚨【緊急解説】React2Shell (CVE-2025-55182) 「Log4Shellの再来」とも警戒されるCVSS 10.0の脆弱性。 React/Next.jsを利用する全組織に影響 ⚠️ なぜ「デフォルト設定」で危険? ⚠️ 「死角」に潜むサプライチェーンリスクとは? メカニズムと対策を徹底解説しました👇 https://t.co/nfMavKD5iZ
0
15
24
@intigriti
Intigriti
5 months
Easiest way to test for Log4Shell (even in 2025) 🤠 Example 👇
1
20
164
@github
GitHub
2 months
The internet was on fire. 🔥 One small library affecting billions of systems. Log4Shell was the biggest security vulnerability of all time. Now, Log4J maintainer, Christian Grobmeier tells us what it felt like inside the flames 👉 https://t.co/sORUhKAwBz
9
44
192
@intigriti
Intigriti
4 months
Exploiting Log4Shell in 2025 (complete guide) 😎 🧵👇
2
30
146
@CyberRaiju
Jai Minton
11 days
CVE-2025-55182 (React2Shell) pre-auth RCE is likely to have a long tail time similar to Log4Shell Log4j injection and Telerik deserialisation vulnerabilities have in the past. This is already being weaponised by threat actors with public POCs available. https://t.co/DbrEsfTSrS
3
14
87
@BradSmi
Brad Smith
2 months
In November 2021, a zero-day flaw in a widely used software library called Log4j allowed hackers to take full control of compromised devices through a simple application interface. This event crossed into mainstream headlines and became known as Log4Shell. Governments and
3
16
27
@SimoKohonen
Simo
8 days
Nice payloads... (it's a Log4Shell variant it seems)
5
4
57
@GitHubEducation
GitHub Education
2 months
“Ignorance will break all software.” Log4Shell’s one line of code broke the internet, and taught us all a lesson we can’t ignore. As Christian Grobmeier, maintainer of Log4J puts it: "Learning is the only cure for ignorance. So just keep learning."
0
2
7
@Cyber_O51NT
Cyber_OSINT
22 days
APT41, a skilled threat actor since 2007, conducts cyber espionage and crime, targeting diverse sectors and exploiting vulnerabilities like Log4Shell within hours, maintaining long-term access for months or years. #CyberSecurity #APT41
1
7
23
@payloadartist
payloadartist
12 days
Four years ago in December 2021, we had Log4shell. Now in December 2025, we have React2shell. It's as widespread and bad, as in unauthenticated and RCE. A coincidence? 😂 #infosec #cybersecurity #bugbounty
0
0
10
@gf_256
cts🌸
13 days
thanksgiving 2021: log4shell thanksgiving 2025: react2shell some things never change...
@_sy1vi3
Sylvie
13 days
react2shell:11/29/25:lachlan2k:sy1vi3 sha256:18571097aedaec16f729c4227e1e508fe161d5d6b4256eec7d0525535ebb3fa0 https://t.co/7W0mKmGyRg
14
148
2K
@intigriti
Intigriti
6 months
For some bug bounty hunters, the Log4Shell hunt never truly ended... 😈 While most moved on, some researchers know this vulnerability is still hiding in production systems across the web, even today 👀 We just published a comprehensive guide showing exactly how to uncover
2
26
167
@rseroter
Richard Seroter
6 days
"According to Sonatype, roughly 13 percent of all Log4j downloads in 2025 were still for versions featuring the Log4Shell vulnerability; despite safe iterations being available for nearly four years." https://t.co/0r9FM8iXRg < crazy
1
8
14
@nav1n0x
N$
5 months
Guys, whoever is using my Log4Shell/Log4J payload from Pastebin, make sure to replace my token ( https://t.co/QQHGMkCpDs) with your own. I don’t mind though... 😅
7
13
198
@PunsCyber
cyber_security_puns
2 months
Flashback from Log4Shell!
0
1
3
@1336_0ff_by_0ne
1336_0ff_by_0ne
9 months
I worked with a local silkscreen artist to make these patches for Crowdstruck, MOVEit Transfer and Log4shell. In recognition of analysts and responders who handled these major incidents, working nights, weekends and holidays. I think of them as merit badges. Ready to be pinned or
0
4
15
@matrosov
Alex Matrosov
10 days
With Log4Shell, the hard part was separating real risk from just having Log4j around, lots of instances, fewer truly exploitable paths. React2Shell is different, if you’re on the affected React Server Components stack, assume exploitable. Closer to crown-jewel data, too.
0
7
34
@intigriti
Intigriti
5 months
💡 Tip! Injecting Log4Shell payloads is also possible in PDF files! eelyvy has a dedicated GitHub repository showing exactly how to craft your PDF payload file! 😎 🔗 https://t.co/fjMU9yOYje
2
96
405
@github
GitHub
2 months
Write your developer horror story in 5 words or less. 🎃 We'll go first: Remote code execution. https://t.co/sORUhKAwBz
12
12
75