The following enhancements and improvements are now available to Censys users.
Censys Platform
- Use Collections to track and monitor the results of a Censys query over time.
- Save time and resources by creating a collection and configuring alerts to track new assets that match your queries.
- Collections track both additions and subtractions to assets that match your queries.
- Configure collection webhooks to receive real-time alerts for any changes within your collections.
- Collections are currently available to Platform Starter users.
- Learn more about Collections in the Censys Academy.
Censys ASM
- Use risk evidence to understand how Censys ASM detected a risk and determine whether a risk requires further validation before it is prioritized for remediation.
- Risk evidence links directly to the scan data that includes the evidence for risk. This enables you to accelerate your investigations and use Censys data to find and close risks faster.
Rapid Response
The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.
- Authentication Bypass Vulnerability in Next.js jCVE-2025-29927]
- Use the following queries to map Next.js services. Not all of these are necessarily vulnerable, as specific version information may not be available.
New protocols
Added support for the following protocols.
Protocol | Query |
CHECK_MK_AGENT | |
NATS_IO |
New fingerprints
Added the following fingerprints.
Type | Name | Description | Query |
risk | Exposed Kubernetes Ingress NGINX Admission Controller | The affected service exposes a Kubernetes Ingress NGINX Admission Controller. This controller is vulnerable to multiple critical unauthenticated Remote Code Execution vulnerabilities collectively known as "IngressNightmare" (CVE-2025-1974, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-24513). Exploitation can lead to unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster, which could result in complete cluster takeover. | |
risk | Vulnerable Next.js .CVE-2025-29927] | Next.js contains a vulnerability that could allow an attacker to execute arbitrary code through a specially crafted request. This affects versions 11.1.4 through 12.3.5, 13.0.0 through 13.5.9, 14.0.0 through 14.2.25, and 15.0.0 through 15.2.3. |