Next.js で認証を 実装する方法
https://qiita.com/TOMOSIA-HieuNT/items/4e0ef83fd384a477e480?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items
LIFF SDKの認証をAuth.js (NextAuth.js)でサーバーサイド対応にする
https://qiita.com/hisuzuya/items/1290b9495a5b5839565e?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items
【個人開発】Qiita記事を手元に残してオフラインで読めるMarkdown / PDF保存ツールを個人開発した【Next.js / React / TypeScript / Playwright / Qiita API】
https://qiita.com/kazutorahattori/items/fe68c9566983b1d28a1b?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items
Next.js × Tailwind CSSでdaisyUIを検証:MUIとの比較と導入手順
https://qiita.com/TsuchiyaK/items/77157eb9632093854b71?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items
📢 Le groupe RondoDox exploite la faille React2Shell de Next.js pour cibler plus de 90 000 appareils
📝 Selon HackRead, le groupe de hackers **RondoDox** exploite la vulnérabilité **React2Shell** dans **Next.js*...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-06-le-groupe-rondodox-exploite-la-faille-react2shell-de-next-js-pour-cibler-plus-de-90-000-appareils/
🌐 source : https://hackread.com/rondodox-botnet-react2shell-hijack-unpatched-devices/
#IoT #Next_js #Cyberveille
Next JavaScript app is hacked, you just don't know it yet
https://audits.blockhacks.io/audit/your-next-js-app-is-already-hacked
#ycombinator #Next_js #Security #NPMSCan
📢 Umami (Next.js) compromis: exploitation de CVE-2025-66478 pour miner du Monero sur un serveur Hetzner
📝 Source: Blog personnel de Jake Saunders.
📖 cyberveille : https://cyberveille.ch/posts/2025-12-21-umami-next-js-compromis-exploitation-de-cve-2025-66478-pour-miner-du-monero-sur-un-serveur-hetzner/
🌐 source : https://blog.jakesaunders.dev/my-server-started-mining-monero-this-morning/
#CVE_2025_66478 #Next_js #Cyberveille
Using TypeScript to Obtain One of the Rarest License Plates
https://www.jack.bio/blog/licenseplate
#ycombinator #Life360 #API_reverse_engineering #driving_leaderboard #speed_leaderboard #viral_project #TikTok #programming #Python #Next_js #web_app #data_visualization #hacking #job_offer #side_project
📢 CVE-2025-55182 : RCE via React Server Functions/Next.js par références de prototype non sécurisées
📝 Une publication technique décrit en détail CVE-2025-55182, une faille RCE affectant les React Server Functions (utilisées not...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-10-cve-2025-55182-rce-via-react-server-functions-next-js-par-references-de-prototype-non-securisees/
🌐 source : https://github.com/msanft/CVE-2025-55182
#Next_js #Prototype_poisoning #Cyberveille
シロクオンラインショップにおけるモダンフロントエンド導入の舞台裏
https://developers.cyberagent.co.jp/blog/archives/60549/