Mend.io Blog

From zero to rce: how a single http request compromises react and next. Js applications

From Zero to RCE: How a Single HTTP Request Compromises React and Next.js Applications

LATEST
Learn more

Filter & Search

From zero to rce: how a single http request compromises react and next. Js applications - blog critical cve 2025 55182

From Zero to RCE: How a Single HTTP Request Compromises React and Next.js Applications

Discover a critical security flaw that enables remote code execution in React Server Components.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - mend wiz integration graphic

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

See how Mend.io and Wiz deliver true code-to-cloud visibility.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - blog cover top 7 ast providers post 1

Best Application Security Testing Providers: Top 7 in 2025

Discover how AST providers help teams find and fix vulnerabilities.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - blog zero day shai hulud v2

Shai-Hulud: The Second Coming

See how the latest Shai-Hulud attack works.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - best sast tools top 10 solutions in 2025

Best SAST tools: Top 10 solutions in 2025

Explore the top 10 SAST tools of 2025.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - blog banner risk reduction dashboard 2

AppSec metrics fail, Mend.io’s Risk Reduction Dashboard fixes it

See how Mend.io's Risk Reduction Dashboard works.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - red teaming blog post v3

Why AI Red Teaming is different from traditional security

Explore how AI red teaming redefines security.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - renovate npm post 1

Building a more secure npm ecosystem with Mend Renovate

See how Mend Renovate is strengthening npm ecosystem security.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - best application security testing providers

Best Application Security Testing Services to Know

Discover the best Application Security Testing (AST) services in 2025.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - open source security post

Ultimate Guide to Open Source Security: Risks, Attacks & Defenses

Explore top risks and proven open source security strategies.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - blog agentic ide

Mend.io Expands AI Native AppSec to Windsurf, CoPilot, Claude Code, and Amazon Q Developer

Learn how Mend.io brings real-time AppSec to AI coding tools.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - container security blog

Building Strong Container Security for Modern Applications

Discover how to protect containerized applications.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - code scanning

Code Scanning in 2025: Why, How & the Role of Scanning in AI Security

Explore code scanning benefits, tools, and best practices.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - top open source licenses

Top Open Source Licenses Explained

Explore the top open source licenses. Learn about copyleft vs permissive licenses.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - container scanning

We Knew Registry Scanning Wasn’t Enough. So We Built What Comes Next.

Stop scanning everything: Focus on what’s actually running.

Read More Read More
From zero to rce: how a single http request compromises react and next. Js applications - gartner mq blog thumbnail v2

Mend.io is Recognized in the 2025 Gartner®Magic Quadrant™ for Application Security Testing

Mend.io named Visionary in 2025 Gartner® Magic Quadrant™ for AST

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!