Marius Avram
@securityshell
Followers
16K
Following
12K
Media
623
Statuses
17K
Web Application Security Consultant. Two sons' proud dad!
Online
Joined May 2009
Microsoft promises more bug payouts, with or without a bounty program
theregister.com
: Critical vulnerabilities found in third-party applications eligible for award under 'in scope by default' move
0
1
0
With more than 8,500 satellites in orbit, Starlink provides connectivity through harsh weather conditions, network disruptions, and natural disasters. Order online in under 2 minutes.
757
2K
12K
🚨 React has disclosed two new, additional vulnerabilities to the critical RCE vuln of last week - CVE-2025-55183 and CVE-2025-55184. Patches are available and urged to be applied immediately. Track live attacks against React honeypots 👉 https://t.co/GXFaqggV8a
0
19
80
I wrote up a little post about OPSEC and how to learn from other people’s failures. https://t.co/Wk8bnoy4xT
#OPSEC
buttondown.com
Bad Opsec Considered Harmful I recently became aware of a GitHub repository collecting “Bad OPSEC” cases—instances where people were caught due to mistakes...
3
91
387
#Pruva reproduction and Detection/Scanner for the CVE-2024-55947 bypass CVE-2025-8110 , but as @wiz_io said, it could be that the artficats are gone or private. Gogs Path Traversal Vulnerability https://t.co/DpoWafsAcq
🚨 700+ Gogs servers hacked — no patch yet. New flaw (CVE-2025-8110) lets attackers overwrite files and run code through symbolic links, bypassing last year’s fix. Wiz found Supershell malware — often used by Chinese groups — on many hacked servers. 🔗 Read:
1
14
70
Extending Burp Suite for fun and profit – The Montoya way – Part 9 - HN Security
hnsecurity.it
A comprehensive guide on extending Burp Scanner with custom scan checks.
0
1
0
@NomaSecurity we just published a critical security vulnerability in Gemini Enterprise, and indirect prompt injection that exposed Google Docs, Calendar and Gmail. Thanks to @GoogleVRP for the collaboration. https://t.co/yEc63WHLmC
noma.security
Noma Labs discovered a zero-click vulnerability, known as GeminiJack, using an indirect prompt injection inside Google Gemini Enterprise.
3
22
49
Air-gapped cybersecurity assistant for security professionals. 100% offline AI-powered analysis tool for Nmap, Volatility, BloodHound, Metasploit, YARA, and more. Built for environments where cloud AI isn't available.
gitlab.com
Air-gapped cybersecurity assistant for security professionals. 100% offline AI-powered analysis tool for Nmap, Volatility, BloodHound, Metasploit, YARA, and more. Built for environments where cloud...
0
0
0
Meet AutoVader. It automates DOM Invader with Playwright Java and feeds results back into Burp. Faster client side bug hunting for everyone. 🚀 https://t.co/ZWWX4y2IRC
thespanner.co.uk
Four years ago we released DOM Invader, I added a feature called callbacks that enabled you to execute JavaScript and log when sinks, messages or sources are found. This was so powerful but over the...
1
4
30
🔴 Watch out, someone is "patching" (?) servers vulnerable to #React2Shell and leaving a warning message about CVE-2025-55182 in English, Chinese, Japanese, and Spanish. According to Censys, 314 servers had/have this condition at this very moment. The vast majority of domains
1
69
463
Polish police detained three Ukrainians with professional hacking equipment: FLIPPER, spy detector, antennas, laptops, SIM cards. Charges include attempted damage to IT data critical for national security. Suspects couldn't explain equipment's purpose (when asked, they suddenly
45
64
535
Holy shit… the exploitation of CVE-2025-55182 has reached a new level. There’s now a publicly available Chrome extension on GitHub that automatically scans for and exploits vulnerable sites as you browse. Absolutely wild. 🤦♂️
64
420
4K
🚨BREAKING: The EU has fined X €120m for refusing to engage with censorship This is a direct assault on free speech. The EU is the enemy of the people.
1K
5K
28K
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
aws.amazon.com
Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by multiple China state-nexus threat...
0
0
1
Somewhere right now, there are ten thousand laptops sounding like jet engines running the exact same CVE-2025-55182 POC. All sprinting to be the 9,999th duplicate so Hackerone/Bugcrowd can bless them with a kudos. Dream big, kings, history remembers the duplicates! 😂
0
0
4
An unauthenticated RCE PoC for the React vuln (CVE-2025-55182) is now public. Confirmed to work on my test setup (Next.js 16.0.6 with React 19.2.0).
8
77
638
You can now scan for #react2shell in @Burp_Suite. To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to @assetnote for sharing a reliable detection technique!
7
106
645
Since I started to analyze CVE-2025-55182 (React, NextJS RCE) at work today, I decided to publish my analysis findings so far, given all the fuzz about the vulnerability: https://t.co/VFu7NxJ3TQ Feel free to contribute to the search for a proper RCE sink!
github.com
Explanation and full RCE PoC for CVE-2025-55182. Contribute to msanft/CVE-2025-55182 development by creating an account on GitHub.
4
70
355
Today we partnered with Meta to disclose a critical vulnerability in React Server Components, impacting Next.js. Huge credit to Lachlan Davidson for responsibly reporting this to Meta and to our industry partners for responding quickly to our call-to-action. This is how open
vercel.com
Vercel has provided a patch for CVE-2025-55182 affecting any frameworks allowing Server Components usage.
30
54
700