Exploit5lover πŸ‡΅πŸ‡°πŸ‡΅πŸ‡Έ (@exploit5lover) 's Twitter Profile
Exploit5lover πŸ‡΅πŸ‡°πŸ‡΅πŸ‡Έ

@exploit5lover

A Student Who claims to be a Hacker - :

ID: 1577992449418477568

linkhttp://www.x.com calendar_today06-10-2022 12:02:00

470 Tweet

106 Followers

68 Following

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-48367: DoS in Redis, 7.0 rating❗️ One of two recent vulnerabilities discovered in Redis. Allows an attacker to perform a DoS. Search at Netlas.io: πŸ‘‰ Link: nt.ls/Lve8A #cybersecurity #vulnerability_map

CVE-2025-48367: DoS in Redis, 7.0 rating❗️

One of two recent vulnerabilities discovered in Redis. Allows an attacker to perform a DoS.

Search at Netlas.io:
πŸ‘‰ Link: nt.ls/Lve8A

#cybersecurity #vulnerability_map
SecurityWall (@secwallofficial) 's Twitter Profile Photo

πŸŽ–οΈ SecurityWall Makes History! 30+ top-ranked ethical hackers from Synack, HackerOne & Bugcrowd tried breaching our Hybrid Offensive Cyber Security Platform β€” SLASH. πŸ’₯ ZERO vulnerabilities found. πŸ” We call it: Hack Before Hacked. #HackBeforeHacked #SLASH #LiveHacking

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-40600: DoS in SonicWall, 7.5 rating❗️ A "Use of Externally-Controlled Format String" vuln allows attackers to perform a remote DoS on some SonicWall VPN instances. Search at Netlas.io: πŸ‘‰ Link: nt.ls/HhWT4 #cybersecurity #vulnerability_map

CVE-2025-40600: DoS in SonicWall, 7.5 rating❗️

A "Use of Externally-Controlled Format String" vuln allows attackers to perform a remote DoS on some SonicWall VPN instances.

Search at Netlas.io:
πŸ‘‰ Link: nt.ls/HhWT4

#cybersecurity #vulnerability_map
Ehsan (@ehsan1579) 's Twitter Profile Photo

What I like most about myself is the ability to never feel satisfied even after a major win. I hit a 100k crit back in August, felt happy for a day then went back to work to hit 200k this month, and still have many more stuff coming for October. Happiness and excitement are

React (@reactjs) 's Twitter Profile Photo

We disclosed two new RSC vulnerabilities: - Denial of Service (High): CVE-2025-55184 - Source Code Exposure (Medium): CVE-2025-55183 Patches are available now, please update immediately. react.dev/blog/2025/12/1…

Exploit5lover πŸ‡΅πŸ‡°πŸ‡΅πŸ‡Έ (@exploit5lover) 's Twitter Profile Photo

Alhamdulillah, Second last bounty of this year. In the last two months I tried to focus on quality not quantity. And yes! I’ll definitely share tips with all of you, though I am not an expert. #BugBounty #hackerone

Alhamdulillah, 
Second last bounty of this year. In the last two months I tried to focus on quality not quantity.
And yes! I’ll definitely share tips with all of you, though I am not an expert.
#BugBounty #hackerone
Exploit5lover πŸ‡΅πŸ‡°πŸ‡΅πŸ‡Έ (@exploit5lover) 's Twitter Profile Photo

If you find a stored XSS that auto-executes for many users but can’t be escalated further, it may still be abused for user-level availability impact by poisoning cookies at scale, causing requests to fail due to header size limits.