Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@catnap707 Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::265308969.png) @catnap707 ねこさん⚡(ΦωΦ)

ねこさん⚡(ΦωΦ) posts on X about cloudflare, notable, javascript, sap the most. They currently have XXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.

### Engagements: XXX [#](/creator/twitter::265308969/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::265308969/c:line/m:interactions.svg)

- X Week XXXXX +38%
- X Month XXXXXX +32%
- X Months XXXXXX +147%
- X Year XXXXXXX +67%

### Mentions: X [#](/creator/twitter::265308969/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::265308969/c:line/m:posts_active.svg)

- X Month XX +17%
- X Months XXX +55%
- X Year XXX +24%

### Followers: XXXXX [#](/creator/twitter::265308969/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::265308969/c:line/m:followers.svg)

- X Week XXXXX +0.30%
- X Month XXXXX +0.57%
- X Months XXXXX +4.30%
- X Year XXXXX +10%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::265308969/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::265308969/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[stocks](/list/stocks)  XXXXX% [technology brands](/list/technology-brands)  XXXXX%

**Social topic influence**
[cloudflare](/topic/cloudflare) #70, [notable](/topic/notable) #28, [javascript](/topic/javascript) 6.25%, [sap](/topic/sap) 6.25%, [ana](/topic/ana) 6.25%, [hosted](/topic/hosted) 6.25%, [poc](/topic/poc) 6.25%, [$4704t](/topic/$4704t) XXXX%

**Top assets mentioned**
[Cloudflare, Inc. (NET)](/topic/cloudflare)
### Top Social Posts
Top posts by engagements in the last XX hours

"http.html:content="Web site created using create-react-app" CRACreate React AppRSCReact Server Components"  
[X Link](https://x.com/catnap707/status/1998205262378029317)  2025-12-09T01:37Z 3370 followers, XXX engagements


"Ivanti warns of critical Endpoint Manager code execution flaw "Tracked as CVE-2025-10573 this critical security flaw can be exploited by remote unauthenticated threat actors to execute arbitrary JavaScript code throughlow-complexity cross-site""  
[X Link](https://x.com/catnap707/status/1998509436223336671)  2025-12-09T21:45Z 3371 followers, XXX engagements


"2025/12/10 # # #Phishing #Scam #Amazon #GMO #MyJCB #JCB #NTT"  
[X Link](https://x.com/catnap707/status/1998514477344633241)  2025-12-09T22:05Z 3370 followers, XXX engagements


"Fortinet warns of critical FortiCloud SSO login auth bypass flaws "Threat actors can exploit the two security flaws tracked as CVE-2025-59718 (FortiOS FortiProxy FortiSwitchManager) and CVE-2025-59719 (FortiWeb) by abusing improper verification of""  
[X Link](https://x.com/catnap707/status/1998510133354311793)  2025-12-09T21:48Z 3369 followers, XXX engagements


"Fortinet Ivanti and SAP Issue Urgent Patches for Authentication and Code Execution Flaws "To temporarily protect their systems against attacks exploiting these vulnerabilities organizations are advised to disable the FortiCloud login feature""  
[X Link](https://x.com/catnap707/status/1998744832639119801)  2025-12-10T13:21Z 3369 followers, XXX engagements


"2025/12/11 # # #Phishing #Scam #Amazon #GMO #DHL # #ANA # #JAL # #MyJCB #JCB #VISA #VPASS #"  
[X Link](https://x.com/catnap707/status/1998871916715848170)  2025-12-10T21:46Z 3369 followers, XXX engagements


"React2Shell Exploitation Escalates into Large-Scale Global Attacks Forcing Emergency Mitigation "Security researcher Rakesh Krishnan has also discovered an open directory hosted on "154.61.77.105:8082" that includes a proof-of-concept (PoC)""  
[X Link](https://x.com/catnap707/status/1999407995973960090)  2025-12-12T09:16Z 3371 followers, XX engagements


"Fortinet Patches Critical Authentication Bypass Vulnerabilities - SecurityWeek "Tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.8) the two bugs are described as improper verification of cryptographic signature issues.""  
[X Link](https://x.com/catnap707/status/1998870170958487788)  2025-12-10T21:39Z 3371 followers, XXX engagements


"React2Shell Exploits Flood the Internet as Attacks Continue "WAF bypasses are notable because companies like Cloudflare and AWS deployed new WAF rules prior to CVE-2025-55182's disclosure that are designed to block React2Shell attacks.""  
[X Link](https://x.com/catnap707/status/1999672737011474749)  2025-12-13T02:48Z 3371 followers, XXX engagements


""Trend Micro said effective WAF rules must also block $@ chunk references; the resolved_model string; the constructor:constructor pattern; and the _formData.get pattern.""  
[X Link](https://x.com/catnap707/status/1999673632508055717)  2025-12-13T02:52Z 3371 followers, XX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@catnap707 Avatar @catnap707 ねこさん⚡(ΦωΦ)

ねこさん⚡(ΦωΦ) posts on X about cloudflare, notable, javascript, sap the most. They currently have XXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.

Engagements: XXX #

Engagements Line Chart

  • X Week XXXXX +38%
  • X Month XXXXXX +32%
  • X Months XXXXXX +147%
  • X Year XXXXXXX +67%

Mentions: X #

Mentions Line Chart

  • X Month XX +17%
  • X Months XXX +55%
  • X Year XXX +24%

Followers: XXXXX #

Followers Line Chart

  • X Week XXXXX +0.30%
  • X Month XXXXX +0.57%
  • X Months XXXXX +4.30%
  • X Year XXXXX +10%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence stocks XXXXX% technology brands XXXXX%

Social topic influence cloudflare #70, notable #28, javascript 6.25%, sap 6.25%, ana 6.25%, hosted 6.25%, poc 6.25%, $4704t XXXX%

Top assets mentioned Cloudflare, Inc. (NET)

Top Social Posts

Top posts by engagements in the last XX hours

"http.html:content="Web site created using create-react-app" CRACreate React AppRSCReact Server Components"
X Link 2025-12-09T01:37Z 3370 followers, XXX engagements

"Ivanti warns of critical Endpoint Manager code execution flaw "Tracked as CVE-2025-10573 this critical security flaw can be exploited by remote unauthenticated threat actors to execute arbitrary JavaScript code throughlow-complexity cross-site""
X Link 2025-12-09T21:45Z 3371 followers, XXX engagements

"2025/12/10 # # #Phishing #Scam #Amazon #GMO #MyJCB #JCB #NTT"
X Link 2025-12-09T22:05Z 3370 followers, XXX engagements

"Fortinet warns of critical FortiCloud SSO login auth bypass flaws "Threat actors can exploit the two security flaws tracked as CVE-2025-59718 (FortiOS FortiProxy FortiSwitchManager) and CVE-2025-59719 (FortiWeb) by abusing improper verification of""
X Link 2025-12-09T21:48Z 3369 followers, XXX engagements

"Fortinet Ivanti and SAP Issue Urgent Patches for Authentication and Code Execution Flaws "To temporarily protect their systems against attacks exploiting these vulnerabilities organizations are advised to disable the FortiCloud login feature""
X Link 2025-12-10T13:21Z 3369 followers, XXX engagements

"2025/12/11 # # #Phishing #Scam #Amazon #GMO #DHL # #ANA # #JAL # #MyJCB #JCB #VISA #VPASS #"
X Link 2025-12-10T21:46Z 3369 followers, XXX engagements

"React2Shell Exploitation Escalates into Large-Scale Global Attacks Forcing Emergency Mitigation "Security researcher Rakesh Krishnan has also discovered an open directory hosted on "154.61.77.105:8082" that includes a proof-of-concept (PoC)""
X Link 2025-12-12T09:16Z 3371 followers, XX engagements

"Fortinet Patches Critical Authentication Bypass Vulnerabilities - SecurityWeek "Tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.8) the two bugs are described as improper verification of cryptographic signature issues.""
X Link 2025-12-10T21:39Z 3371 followers, XXX engagements

"React2Shell Exploits Flood the Internet as Attacks Continue "WAF bypasses are notable because companies like Cloudflare and AWS deployed new WAF rules prior to CVE-2025-55182's disclosure that are designed to block React2Shell attacks.""
X Link 2025-12-13T02:48Z 3371 followers, XXX engagements

""Trend Micro said effective WAF rules must also block $@ chunk references; the resolved_model string; the constructor:constructor pattern; and the _formData.get pattern.""
X Link 2025-12-13T02:52Z 3371 followers, XX engagements

@catnap707
/creator/twitter::catnap707