Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@zoomeye_team Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::2250144985.png) @zoomeye_team ZoomEye

ZoomEye posts on X about oracle, tplink the most. They currently have XXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::2250144985/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:interactions.svg)

- X Week XXXXXX -XXXX%
- X Month XXXXXXX +45%
- X Months XXXXXXX +50%
- X Year XXXXXXX +177%

### Mentions: XX [#](/creator/twitter::2250144985/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:posts_active.svg)

- X Week XX +57%
- X Month XX -XXXX%
- X Months XXX +3.90%
- X Year XXX +7%

### Followers: XXXXX [#](/creator/twitter::2250144985/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:followers.svg)

- X Week XXXXX +1.70%
- X Month XXXXX +5.20%
- X Months XXXXX +30%
- X Year XXXXX +59%

### CreatorRank: XXXXXXX [#](/creator/twitter::2250144985/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::2250144985/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::2250144985/influence)
---

**Social category influence**
[technology brands](/list/technology-brands)  XXXXX% [finance](/list/finance)  XXXX% [cryptocurrencies](/list/cryptocurrencies)  XXXX%

**Social topic influence**
[oracle](/topic/oracle) #539, [tplink](/topic/tplink) XXXX%

**Top accounts mentioned or mentioned by**
[@nihsuyhp](/creator/undefined) [@gn3mes1s](/creator/undefined)
### Top Social Posts [#](/creator/twitter::2250144985/posts)
---
Top posts by engagements in the last XX hours

"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978303894708195492) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-15T03:36Z 9776 followers, 53.7K engagements


"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980477509134348637) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T03:33Z 9776 followers, 13.6K engagements


"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981190881089900881) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T02:48Z 9776 followers, 16.1K engagements


"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981264007815451119) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T07:38Z 9776 followers, 1496 engagements


"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981306609239544089) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-23T10:28Z 9776 followers, 1715 engagements


"🚨🚨CVE-2025-49844 (CVSS 10): Redis Lua RCE Authenticated attackers can exploit a Lua script to trigger a use-after-free enabling RCE. Affects all Lua-enabled Redis versions. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-49844" ZoomEye Dork👉app="Redis" Shows 3.4M+ exposed instances. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1976593052358914358) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-10T10:18Z 9757 followers, 5777 engagements


"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977681086437069288) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-13T10:21Z 9767 followers, 5598 engagements


"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1977935545268588642) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-14T03:12Z 9774 followers, 2144 engagements


"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980577026210951255) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-21T10:08Z 9761 followers, 1575 engagements


"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1979022023528714331) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-17T03:09Z 9776 followers, 1390 engagements


"🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980100656490066366) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T02:35Z 9776 followers, 11.2K engagements


"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980213305798254645) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-20T10:03Z 9776 followers, 1173 engagements


"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1980941411387424898) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-22T10:16Z 9776 followers, 1353 engagements


"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1978764337092468972) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-16T10:05Z 9776 followers, 18.8K engagements


"🚨🚨CVE-2025-6440 (CVSS 9.8): WooCommerce Designer Pro Unauthenticated Arbitrary File Upload A flaw in the wcdp_save_canvas_design_ajax function allows unauthenticated attackers to upload arbitrary files potentially enabling remote code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-6440" ZoomEye Dork👉app="WordPress WooCommerce plugin" && "woocommerce-pro" Over 5.4k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"  
[X Link](https://x.com/zoomeye_team/status/1981668321427853580) [@zoomeye_team](/creator/x/zoomeye_team) 2025-10-24T10:25Z 9776 followers, 2076 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@zoomeye_team Avatar @zoomeye_team ZoomEye

ZoomEye posts on X about oracle, tplink the most. They currently have XXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX -XXXX%
  • X Month XXXXXXX +45%
  • X Months XXXXXXX +50%
  • X Year XXXXXXX +177%

Mentions: XX #

Mentions Line Chart

  • X Week XX +57%
  • X Month XX -XXXX%
  • X Months XXX +3.90%
  • X Year XXX +7%

Followers: XXXXX #

Followers Line Chart

  • X Week XXXXX +1.70%
  • X Month XXXXX +5.20%
  • X Months XXXXX +30%
  • X Year XXXXX +59%

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands XXXXX% finance XXXX% cryptocurrencies XXXX%

Social topic influence oracle #539, tplink XXXX%

Top accounts mentioned or mentioned by @nihsuyhp @gn3mes1s

Top Social Posts #


Top posts by engagements in the last XX hours

"🚨🚨Critical RCE Vulnerabilities in Veeam Backup & Replication CVE-2025-48983 (CVSS 9.9): Authenticated domain users can RCE backup infrastructure hosts. CVE-2025-48984 (CVSS 9.9): Authenticated domain users can RCE the Backup Server. ZoomEye Dork👉app="Veeam Backup Enterprise Manager" Over 2.1k related instances detected. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-15T03:36Z 9776 followers, 53.7K engagements

"🚨🚨CVE-2025-55315 (CVSS: 9.9) : Kestrel HTTP Request and Response Smuggling Kestrel has inconsistencies in HTTP parsing that allow an authenticated attacker to bypass network defenses via HTTP request/response smuggling. 🔥PoC from @gN3mes1s: Search by vul.cve Filter👉vul.cve="CVE-2025-55315" ZoomEye Over 46.3M instances detected. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T03:33Z 9776 followers, 13.6K engagements

"🚨🚨CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. Search by vul.cve Filter👉vul.cve="CVE-2025-22167" ZoomEye Dork👉app="Atlassian JIRA" Over 107k vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T02:48Z 9776 followers, 16.1K engagements

"🚨🚨CVE-2025-54469 (CVSS: 10): Critical NeuVector RCE Unsanitized CLUSTER_RPC_PORT/CLUSTER_LAN_PORT are passed to popen() at startup allowing attackers who can modify env vars to inject arbitrary commands. Search by vul.cve Filter👉vul.cve="CVE-2025-54469" ZoomEye Dork👉app="NeuVector" XXX instances spotted. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T07:38Z 9776 followers, 1496 engagements

"🚨🚨New Critical Vulnerabilities in Oracle E-Business CVE-2025-53072 & CVE-2025-62481 expose the Oracle Marketing app to unauthenticated attackers risking full system takeover. ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-23T10:28Z 9776 followers, 1715 engagements

"🚨🚨CVE-2025-49844 (CVSS 10): Redis Lua RCE Authenticated attackers can exploit a Lua script to trigger a use-after-free enabling RCE. Affects all Lua-enabled Redis versions. 🔥PoC: Search by vul.cve Filter👉vul.cve="CVE-2025-49844" ZoomEye Dork👉app="Redis" Shows 3.4M+ exposed instances. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-10T10:18Z 9757 followers, 5777 engagements

"🚨🚨New Oracle Security Alert Advisory CVE-2025-61884 (CVSS: 7.5): Critical Unauth Vulnerability in Oracle E-Business Suite Unauthenticated attackers can exploit this flaw over HTTP to gain full access to Oracle Configurator's sensitive data. No auth needed just network access. Search by vul.cve Filter👉vul.cve="CVE-2025-61884" ZoomEye Dork👉app="Oracle E-Business Suite" Over 18.9k vulnerable instances found. ZoomEye Link: Refer: X. X. X. #Oracle #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-13T10:21Z 9767 followers, 5598 engagements

"🚨🚨CVE-2025-37729 (CVSS 9.1): Critical Jinjava Template Injection in Elastic Cloud Enterprise Attackers with admin access can exploit this for RCE stealing sensitive data or running malicious commands via crafted strings. Search by vul.cve Filter👉vul.cve="CVE-2025-37729" ZoomEye Dork👉app="Elastic Cloud Enterprise" XXX hits found ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-14T03:12Z 9774 followers, 2144 engagements

"🚨🚨Critical TP-Link Omada Gateway Flaw Allows Unauthenticated Remote Command Execution CVE-2025-6541 & CVE-2025-6542: OS command injection vulnerabilities CVE-2025-7850 & CVE-2025-7851: Command injection and root access vulnerabilities ZoomEye Dork👉title="Omada Controller" Over XXXX vulnerable instances found. ZoomEye Link: Refer: X. X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-21T10:08Z 9761 followers, 1575 engagements

"🚨🚨Critical ConnectWise Automate Flaw CVE-2025-11492 (CVSS 9.6): Unencrypted HTTP in misconfigured agents exposes data allowing attackers to intercept or inject malicious commands. CVE-2025-11493 (CVSS 8.8): Poor update verification lets attackers deliver malware via trusted RMM updates. ZoomEye Dork👉app="ConnectWise Automate" Reveals 66.5k+ vulnerable instances. ZoomEye Link: Refer: X. X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-17T03:09Z 9776 followers, 1390 engagements

"🚨🚨CVE-2025-62168 (CVSS: 10): Squid vuln exposes HTTP auth credentials in error handling Attackers can bypass browser security and steal sensitive tokens/credentials. Search by vul.cve Filter👉vul.cve="CVE-2025-62168" ZoomEye Dork👉app="Squid" Over 44.2M vulnerable instances. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T02:35Z 9776 followers, 11.2K engagements

"🚨🚨CVE-2025-62506 (CVSS 8.1): MinIO Privilege Escalation Flaw MinIO's IAM policy validation bug lets attackers with restricted service/STS credentials bypass session policies by misusing the DenyOnly logic. They can create unrestricted service accounts gaining full parent privileges to access modify or delete data. Search by vul.cve Filter👉vul.cve="CVE-2025-62506" ZoomEye Dork👉app="MinIO Browser" 786k+ instances on ZoomEye. ZoomEye Link: Refer: X. X. #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-20T10:03Z 9776 followers, 1173 engagements

"🚨🚨GitLab Fixes Runner Hijacking and Multiple Denial-of-Service Vulnerabilities CVE-2025-11702 CVE-2025-10497 CVE-2025-11447 CVE-2025-11974 CVE-2025-11971 CVE-2025-6601 CVE-2025-11989 ZoomEye Dork👉app="Gitlab" 1.1m+ results are found on ZoomEye. ZoomEye Link: Refer: #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-22T10:16Z 9776 followers, 1353 engagements

"🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-16T10:05Z 9776 followers, 18.8K engagements

"🚨🚨CVE-2025-6440 (CVSS 9.8): WooCommerce Designer Pro Unauthenticated Arbitrary File Upload A flaw in the wcdp_save_canvas_design_ajax function allows unauthenticated attackers to upload arbitrary files potentially enabling remote code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-6440" ZoomEye Dork👉app="WordPress WooCommerce plugin" && "woocommerce-pro" Over 5.4k vulnerable instances. ZoomEye Link: Refer: X. X. #RCE #ZoomEye #cybersecurity #infosec #OSINT"
X Link @zoomeye_team 2025-10-24T10:25Z 9776 followers, 2076 engagements

creator/x::zoomeye_team
/creator/x::zoomeye_team