<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>React.js shell shocked by 10.0 critical vulnerability…</title>
        <link>https://tube.grossholtz.net/videos/watch/73246677-545c-4194-8385-090c5b575170</link>
        <description>Try out Genspark’s all-in-one AI workspace for free - https://www.genspark.ai/?utm_source=yt&amp;utm_campaign=fireship The JavaScript world just got rocked by a 10.0 critical vulnerability called React2Shell (a.k.a. CVE-2025-55182). Let's find out how this React exploit actually works... #Coding #programming #javascript #react 💬 Chat with Me on Discord https://discord.gg/fireship 🔗 Resources https://github.com/facebook/react/security/advisories/GHSA-fv66-9v8q-g76r, 🔥 Get More Content - Upgrade to PRO Upgrade at https://fireship.io/pro Use code YT25 for 25% off PRO access 🎨 My Editor Settings Atom One Dark, vscode-icons, Fira Code Font, 🔖 Topics Covered What is React2Shell?, CVE-2025-55182 explained, React Flight, Which React devs are affected?, What should you do?</description>
        <lastBuildDate>Mon, 06 Apr 2026 01:45:18 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://tube.grossholtz.net</generator>
        <image>
            <title>React.js shell shocked by 10.0 critical vulnerability…</title>
            <url>https://tube.grossholtz.net/client/assets/images/icons/icon-512x512.png</url>
            <link>https://tube.grossholtz.net/videos/watch/73246677-545c-4194-8385-090c5b575170</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://tube.grossholtz.net/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://tube.grossholtz.net/feeds/video-comments.xml?videoId=73246677-545c-4194-8385-090c5b575170" rel="self" type="application/rss+xml"/>
    </channel>
</rss>