X S C O R P (@xscorp7) 's Twitter Profile
X S C O R P

@xscorp7

I enjoy security stuff and automation!
Security Researcher | Say hi: xscorp aT pr0tonmail

ID: 1172971651119468544

linkhttps://shashankbarthwal.com/ calendar_today14-09-2019 20:33:41

1,1K Tweet

316 Followers

355 Following

Assetnote (@assetnote) 's Twitter Profile Photo

Our security research team created a high fidelity check for the Next.js/RSC RCE (CVE-2025-55182 & CVE-2025-66478). Read more on our blog here: slcyber.io/research-cente…

STÖK ✌️ (@stokfredrik) 's Twitter Profile Photo

It’s easy to become ”stressed out” on all the things you ”need” to learn in any field. Especially as builders and breakers. Where new tools and techniques surface more or less every day. Ai this, fomo that, And In periods it might even feel like you are missing out, wasting

Suraj (سج) Kumar Talreja (@suritalreja) 's Twitter Profile Photo

Your 30s hit differently. You’re suddenly standing at the intersection of every responsibility life can throw at you. As the elder brother, you’re expected to take care of your younger sibling’s marriage and future. At the same time, you’re raising a child who’s growing every

React (@reactjs) 's Twitter Profile Photo

Researchers have found two new vulnerabilities in React Server Components while attempting to exploit the patches last week. These are new issues, separate from the critical CVE last week. The patch for React2Shell remains effective for the Remote Code Execution exploit.

X S C O R P (@xscorp7) 's Twitter Profile Photo

Is cloudflare DNS really rate-limited at 10 QPS? I couldn't find any official numbers but this thread: news.ycombinator.com/item?id=369844… Can somebody confirm? I have a service that makes 1000+ queries per second.

¯\_(ツ)_/¯ (@chocapikk_) 's Twitter Profile Photo

CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit Unauthenticated to Root RCE: - LFI via Content-Type confusion - Read /proc/self/environ to find HOME - Steal encryption key + database - Forge admin JWT token - Expression injection sandbox bypass - RCE as root

CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit

Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
Devansh (⚡, 🥷) (@0xasm0d3us) 's Twitter Profile Photo

Two of my JWK/JWKS related high severity vulns are now fixed in HonoJS (CVE Pending). Please update to the latest version asap! Advisory: github.com/honojs/hono/se… github.com/honojs/hono/se…

Two of my JWK/JWKS related high severity vulns are now fixed in HonoJS (CVE Pending). Please update to the latest version asap! 

Advisory: 

github.com/honojs/hono/se…

github.com/honojs/hono/se…