Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

[@zoomeye_team](/creator/twitter/zoomeye_team)
"🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980100656490066366) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T02:35Z 9791 followers, 11.3K engagements


"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981306609239544089) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T10:28Z 9791 followers, 1830 engagements


"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977935545268588642) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-14T03:12Z 9774 followers, 2144 engagements


"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978303894708195492) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-15T03:36Z 9784 followers, 53.7K engagements


"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1979022023528714331) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-17T03:09Z 9781 followers, 1391 engagements


"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980213305798254645) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T10:03Z 9776 followers, 1173 engagements


"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977681086437069288) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-13T10:21Z 9787 followers, 5615 engagements


"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980577026210951255) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T10:08Z 9787 followers, 1617 engagements


"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980941411387424898) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-22T10:16Z 9788 followers, 1366 engagements


"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981264007815451119) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T07:38Z 9787 followers, 1549 engagements


"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978764337092468972) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-16T10:05Z 9790 followers, 18.9K engagements


"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980477509134348637) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T03:33Z 9791 followers, 13.8K engagements


"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981190881089900881) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T02:48Z 9791 followers, 16.6K engagements


"🚨🚨CVE-2025-6440 (CVSS 9.8): WooCommerce Designer Pro Unauthenticated Arbitrary File Upload A flaw in the wcdp_save_canvas_design_ajax function allows unauthenticated attackers to upload arbitrary files potentially enabling remote code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-6440" ZoomEye Dork👉app="WordPress WooCommerce plugin" && "woocommerce-pro" Over 5.4k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981668321427853580) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-24T10:25Z 9791 followers, 4638 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@zoomeye_team "🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T02:35Z 9791 followers, 11.3K engagements

"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T10:28Z 9791 followers, 1830 engagements

"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-14T03:12Z 9774 followers, 2144 engagements

"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-15T03:36Z 9784 followers, 53.7K engagements

"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-17T03:09Z 9781 followers, 1391 engagements

"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T10:03Z 9776 followers, 1173 engagements

"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-13T10:21Z 9787 followers, 5615 engagements

"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T10:08Z 9787 followers, 1617 engagements

"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-22T10:16Z 9788 followers, 1366 engagements

"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T07:38Z 9787 followers, 1549 engagements

"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-16T10:05Z 9790 followers, 18.9K engagements

"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T03:33Z 9791 followers, 13.8K engagements

"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T02:48Z 9791 followers, 16.6K engagements

"🚨🚨CVE-2025-6440 (CVSS 9.8): WooCommerce Designer Pro Unauthenticated Arbitrary File Upload A flaw in the wcdp_save_canvas_design_ajax function allows unauthenticated attackers to upload arbitrary files potentially enabling remote code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-6440" ZoomEye Dork👉app="WordPress WooCommerce plugin" && "woocommerce-pro" Over 5.4k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-24T10:25Z 9791 followers, 4638 engagements

creator/twitter::2250144985/posts
/creator/twitter::2250144985/posts