[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@zoomeye_team ZoomEyeZoomEye posts on X about link, code, command, carry the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.
Social topic influence link, code, command #667, carry, entity, login, poc #17, router #133, rsc #19, bounty
Top posts by engagements in the last XX hours
"🚨🚨CVE-2025-66516 (CVSS 10): Apache Tika Critical XXE Attackers can carry out XML External Entity (XXE) injection via a crafted XFA file inside a PDF. Search by vul.cve Filter👉vul.cve="CVE-2025-66516" ZoomEye Dork👉app="Apache Tika" Over 1.4k exposed instances. ZoomEye Link: Refer: X. X. #Apache #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-08T10:16Z 11K followers, 11.7K engagements
"🚨0-Day Exploited in the Wild🚨CVE-2025-8110 (CVSS 8.7): Gogs Symlink Bypass Vulnerability Leading to RCE This vulnerability bypasses the earlier RCE fix (CVE-2024-55947) by abusing committed symlinks that the Gogs API fails to validate allowing attackers to write outside the repo and regain a path to malicious code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-5777" ZoomEye Dork👉app="Gogs" 51.7k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZeroDay #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-11T06:55Z 11K followers, 4217 engagements
"🚨🚨CVE-2025-66489 (CVSS 9.9): Authentication Bypass If an attacker supplies any TOTP code during login the password check is completely skipped thanks to broken conditional logic. Search by vul.cve Filter👉vul.cve="CVE-2025-66489" ZoomEye Scheduling Platform" XXX exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-08T03:38Z 11.1K followers, 30.3K engagements
"🚨🚨CVE-2025-55182 (CVSS 10.0): RCE in React Server Components A decoding bug in React Server Function payloads enables full unauthenticated RCE on vulnerable RSC backends. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-55182" ZoomEye Dork👉http.body="react.production.min.js" http.body="React.createElement(" app="React Router" app="React.js" 3.1M+ exposed React targets. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-04T02:27Z 11.1K followers, 33.2K engagements
"🚨 #React2Shell Using ZoomEye we've identified 672k+ exposed assets potentially affected. 🔍 ZoomEye Dork: http.header="Vary: RSC Next-Router-State-Tree" 🔗 ZoomEye Link:"
X Link 2025-12-08T06:13Z 11.1K followers, 35.9K engagements
"🚨🚨 #React2Shell (CVE-2025-55182) continues to heat up globally and what's really sending bounty hunters' heart rates through the roof is: RCE + no auth + super short exploit chain Hunters already landing successful exploits in high-value bounty programs Massive exposure across Next.js / React SSR assets ⚡Want to skip the "needle in a haystack" phase and jump straight to likely-vulnerable targets Use this dork: http.header="Vary: RSC Next-Router-State-Tree" && is_bugbounty="true" ZoomEye Link: 🚀ZoomEye BugBounty Radar: zero-in on potentially risky bounty domains and spot the $$$"
X Link 2025-12-09T07:52Z 11.1K followers, 15.9K engagements
"🚨🚨CVE-2025-65964 (CVSS 9.4): Git Node RCE in n8n n8n's Git node lets workflows set arbitrary Git config including core.hooksPath point it at a malicious hook in the repo instant RCE on the host. Search by vul.cve Filter👉vul.cve="CVE-2025-65964" ZoomEye Dork👉app="n8n" 223.7k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-10T02:43Z 11.1K followers, 28.9K engagements
"🚨🚨CVE-2025-59718 & CVE-2025-59719: FortiCloud SSO Authentication Bypass Unauthenticated attackers may bypass FortiCloud SSO by abusing crafted SAML messages when the feature is enabled. ZoomEye Dork👉app="Fortinet FortiSwitch" app="Fortinet FortiWeb" app="Fortinet FortiOS" app="Fortinet FortiProxy" 299k+ exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-11T03:31Z 11.1K followers, 10.3K engagements
"🚨PATCH NOW🚨Two New RSC Vulnerabilities CVE-2025-55184(High): Denial of Service CVE-2025-55183(Medium): Source Code Exposure ZoomEye Dork👉http.body="react.production.min.js" http.body="React.createElement(" app="React Router" app="React.js" 3.1m+ exposed instances. ZoomEye Link: Refer: X. X. #React2Shell #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-12T02:22Z 11.1K followers, 14.8K engagements
"🚨🚨 CVE-2025-13780 (CVSS: 9.1): pgAdmin4 Meta-Command Filter Command Execution pgAdmin X XXXX fails to detect meta-commands when a SQL file starts with UTF-8 BOM leading to remote command execution during restore. 🔥 PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-13780" ZoomEye Dork👉app="pgAdmin4" 41.2k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-15T02:31Z 11.1K followers, 13.8K engagements
"🚨🚨CVE-2025-66430 (CVSS 9.1): Root Privilege Escalation in Plesk XXXX A flaw in Plesk's Password-Protected Directories lets any authenticated user inject arbitrary data into Apache config escalating to full root command execution on the server. Search by vul.cve Filter👉vul.cve="CVE-2025-66430" ZoomEye Dork👉app="Plesk Obsidian" 4.3m+ exposed instances. ZoomEye Link: Refer: X. X. #LPE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-15T10:02Z 11.1K followers, 4991 engagements
"🚨🚨 Three Critical Vulnerabilities In FreePBX CVE-2025-61675: Authenticated SQL Injection - Affects endpoint module CVE-2025-61678: Authenticated Arbitrary File Upload - Affects endpoint module CVE-2025-66039: Authentication Bypass - Affects framework module ZoomEye Dork👉 app="FreePBX" 87.7k+ exposed instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-16T03:22Z 11.1K followers, 2781 engagements
"🚨🚨CVE-2025-14265 (CVSS 9.1): Extension Vulnerability in ScreenConnect Server Authenticated admins can install/run arbitrary extensions due to weak server-side validation server-side code execution or config theft. Server-only impact (clients safe). Search by vul.cve Filter👉vul.cve="CVE-2025-14265" ZoomEye Dork👉app="ScreenConnect Remote Management Software" 177.4k+ exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-16T10:04Z 11.1K followers, 2952 engagements