[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@zoomeye_team Avatar @zoomeye_team ZoomEye

ZoomEye posts on X about link, code, command, carry the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

Mentions: XX #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social topic influence link, code, command #667, carry, entity, login, poc #17, router #133, rsc #19, bounty

Top Social Posts

Top posts by engagements in the last XX hours

"🚨🚨CVE-2025-66516 (CVSS 10): Apache Tika Critical XXE Attackers can carry out XML External Entity (XXE) injection via a crafted XFA file inside a PDF. Search by vul.cve Filter👉vul.cve="CVE-2025-66516" ZoomEye Dork👉app="Apache Tika" Over 1.4k exposed instances. ZoomEye Link: Refer: X. X. #Apache #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-08T10:16Z 11K followers, 11.7K engagements

"🚨0-Day Exploited in the Wild🚨CVE-2025-8110 (CVSS 8.7): Gogs Symlink Bypass Vulnerability Leading to RCE This vulnerability bypasses the earlier RCE fix (CVE-2024-55947) by abusing committed symlinks that the Gogs API fails to validate allowing attackers to write outside the repo and regain a path to malicious code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-5777" ZoomEye Dork👉app="Gogs" 51.7k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZeroDay #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-11T06:55Z 11K followers, 4217 engagements

"🚨🚨CVE-2025-66489 (CVSS 9.9): Authentication Bypass If an attacker supplies any TOTP code during login the password check is completely skipped thanks to broken conditional logic. Search by vul.cve Filter👉vul.cve="CVE-2025-66489" ZoomEye Scheduling Platform" XXX exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-08T03:38Z 11.1K followers, 30.3K engagements

"🚨🚨CVE-2025-55182 (CVSS 10.0): RCE in React Server Components A decoding bug in React Server Function payloads enables full unauthenticated RCE on vulnerable RSC backends. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-55182" ZoomEye Dork👉http.body="react.production.min.js" http.body="React.createElement(" app="React Router" app="React.js" 3.1M+ exposed React targets. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-04T02:27Z 11.1K followers, 33.2K engagements

"🚨 #React2Shell Using ZoomEye we've identified 672k+ exposed assets potentially affected. 🔍 ZoomEye Dork: http.header="Vary: RSC Next-Router-State-Tree" 🔗 ZoomEye Link:"
X Link 2025-12-08T06:13Z 11.1K followers, 35.9K engagements

"🚨🚨 #React2Shell (CVE-2025-55182) continues to heat up globally and what's really sending bounty hunters' heart rates through the roof is: RCE + no auth + super short exploit chain Hunters already landing successful exploits in high-value bounty programs Massive exposure across Next.js / React SSR assets ⚡Want to skip the "needle in a haystack" phase and jump straight to likely-vulnerable targets Use this dork: http.header="Vary: RSC Next-Router-State-Tree" && is_bugbounty="true" ZoomEye Link: 🚀ZoomEye BugBounty Radar: zero-in on potentially risky bounty domains and spot the $$$"
X Link 2025-12-09T07:52Z 11.1K followers, 15.9K engagements

"🚨🚨CVE-2025-65964 (CVSS 9.4): Git Node RCE in n8n n8n's Git node lets workflows set arbitrary Git config including core.hooksPath point it at a malicious hook in the repo instant RCE on the host. Search by vul.cve Filter👉vul.cve="CVE-2025-65964" ZoomEye Dork👉app="n8n" 223.7k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-10T02:43Z 11.1K followers, 28.9K engagements

"🚨🚨CVE-2025-59718 & CVE-2025-59719: FortiCloud SSO Authentication Bypass Unauthenticated attackers may bypass FortiCloud SSO by abusing crafted SAML messages when the feature is enabled. ZoomEye Dork👉app="Fortinet FortiSwitch" app="Fortinet FortiWeb" app="Fortinet FortiOS" app="Fortinet FortiProxy" 299k+ exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-11T03:31Z 11.1K followers, 10.3K engagements

"🚨PATCH NOW🚨Two New RSC Vulnerabilities CVE-2025-55184(High): Denial of Service CVE-2025-55183(Medium): Source Code Exposure ZoomEye Dork👉http.body="react.production.min.js" http.body="React.createElement(" app="React Router" app="React.js" 3.1m+ exposed instances. ZoomEye Link: Refer: X. X. #React2Shell #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-12T02:22Z 11.1K followers, 14.8K engagements

"🚨🚨 CVE-2025-13780 (CVSS: 9.1): pgAdmin4 Meta-Command Filter Command Execution pgAdmin X XXXX fails to detect meta-commands when a SQL file starts with UTF-8 BOM leading to remote command execution during restore. 🔥 PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-13780" ZoomEye Dork👉app="pgAdmin4" 41.2k+ exposed instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-15T02:31Z 11.1K followers, 13.8K engagements

"🚨🚨CVE-2025-66430 (CVSS 9.1): Root Privilege Escalation in Plesk XXXX A flaw in Plesk's Password-Protected Directories lets any authenticated user inject arbitrary data into Apache config escalating to full root command execution on the server. Search by vul.cve Filter👉vul.cve="CVE-2025-66430" ZoomEye Dork👉app="Plesk Obsidian" 4.3m+ exposed instances. ZoomEye Link: Refer: X. X. #LPE #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-15T10:02Z 11.1K followers, 4991 engagements

"🚨🚨 Three Critical Vulnerabilities In FreePBX CVE-2025-61675: Authenticated SQL Injection - Affects endpoint module CVE-2025-61678: Authenticated Arbitrary File Upload - Affects endpoint module CVE-2025-66039: Authentication Bypass - Affects framework module ZoomEye Dork👉 app="FreePBX" 87.7k+ exposed instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-16T03:22Z 11.1K followers, 2781 engagements

"🚨🚨CVE-2025-14265 (CVSS 9.1): Extension Vulnerability in ScreenConnect Server Authenticated admins can install/run arbitrary extensions due to weak server-side validation server-side code execution or config theft. Server-only impact (clients safe). Search by vul.cve Filter👉vul.cve="CVE-2025-14265" ZoomEye Dork👉app="ScreenConnect Remote Management Software" 177.4k+ exposed instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link 2025-12-16T10:04Z 11.1K followers, 2952 engagements