Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@zoomeye_team Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::2250144985.png) @zoomeye_team ZoomEye

ZoomEye posts on X about oracle, backup, tplink, runner the most. They currently have XXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::2250144985/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:interactions.svg)

- X Week XXXXXX -XXXX%
- X Month XXXXXXX +45%
- X Months XXXXXXX +50%
- X Year XXXXXXX +177%

### Mentions: XX [#](/creator/twitter::2250144985/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:posts_active.svg)

- X Week XX +57%
- X Month XX -XXXX%
- X Months XXX +3.90%
- X Year XXX +7%

### Followers: XXXXX [#](/creator/twitter::2250144985/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:followers.svg)

- X Week XXXXX +1.70%
- X Month XXXXX +5.20%
- X Months XXXXX +30%
- X Year XXXXX +59%

### CreatorRank: XXXXXXX [#](/creator/twitter::2250144985/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::2250144985/influence)
---

**Social category influence**
[technology brands](/list/technology-brands)  [cryptocurrencies](/list/cryptocurrencies)  [finance](/list/finance) 

**Social topic influence**
[oracle](/topic/oracle) #523, [backup](/topic/backup), [tplink](/topic/tplink), [runner](/topic/runner)
### Top Social Posts [#](/creator/twitter::2250144985/posts)
---
Top posts by engagements in the last XX hours

"🚨🚨CVE-2025-49844 (CVSS 10): Redis Lua RCE Authenticated attackers can exploit a Lua script to trigger a use-after-free enabling RCE. Affects all Lua-enabled Redis versions. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-49844" ZoomEye Dork👉app="Redis" Shows 3.4M+ exposed instances. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1976593052358914358) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-10T10:18Z 9757 followers, 5777 engagements


"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977935545268588642) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-14T03:12Z 9731 followers, 2135 engagements


"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977681086437069288) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-13T10:21Z 9763 followers, 5597 engagements


"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978303894708195492) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-15T03:36Z 9763 followers, 53.6K engagements


"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978764337092468972) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-16T10:05Z 9763 followers, 18.8K engagements


"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1979022023528714331) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-17T03:09Z 9761 followers, 1377 engagements


"🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980100656490066366) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T02:35Z 9765 followers, 11.1K engagements


"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980213305798254645) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T10:03Z 9761 followers, 1154 engagements


"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980477509134348637) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T03:33Z 9764 followers, 13.3K engagements


"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980577026210951255) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T10:08Z 9761 followers, 1575 engagements


"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980941411387424898) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-22T10:16Z 9763 followers, 1325 engagements


"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981190881089900881) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T02:48Z 9764 followers, 14.6K engagements


"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981264007815451119) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T07:38Z 9765 followers, 1386 engagements


"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981306609239544089) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T10:28Z 9765 followers, 1554 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@zoomeye_team Avatar @zoomeye_team ZoomEye

ZoomEye posts on X about oracle, backup, tplink, runner the most. They currently have XXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX -XXXX%
  • X Month XXXXXXX +45%
  • X Months XXXXXXX +50%
  • X Year XXXXXXX +177%

Mentions: XX #

Mentions Line Chart

  • X Week XX +57%
  • X Month XX -XXXX%
  • X Months XXX +3.90%
  • X Year XXX +7%

Followers: XXXXX #

Followers Line Chart

  • X Week XXXXX +1.70%
  • X Month XXXXX +5.20%
  • X Months XXXXX +30%
  • X Year XXXXX +59%

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands cryptocurrencies finance

Social topic influence oracle #523, backup, tplink, runner

Top Social Posts #


Top posts by engagements in the last XX hours

"🚨🚨CVE-2025-49844 (CVSS 10): Redis Lua RCE Authenticated attackers can exploit a Lua script to trigger a use-after-free enabling RCE. Affects all Lua-enabled Redis versions. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-49844" ZoomEye Dork👉app="Redis" Shows 3.4M+ exposed instances. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-10T10:18Z 9757 followers, 5777 engagements

"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-14T03:12Z 9731 followers, 2135 engagements

"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-13T10:21Z 9763 followers, 5597 engagements

"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-15T03:36Z 9763 followers, 53.6K engagements

"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-16T10:05Z 9763 followers, 18.8K engagements

"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-17T03:09Z 9761 followers, 1377 engagements

"🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T02:35Z 9765 followers, 11.1K engagements

"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T10:03Z 9761 followers, 1154 engagements

"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T03:33Z 9764 followers, 13.3K engagements

"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T10:08Z 9761 followers, 1575 engagements

"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-22T10:16Z 9763 followers, 1325 engagements

"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T02:48Z 9764 followers, 14.6K engagements

"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T07:38Z 9765 followers, 1386 engagements

"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T10:28Z 9765 followers, 1554 engagements

@zoomeye_team
/creator/twitter::zoomeye_team