Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1518982517562429441.png) @TheZDIBugs TheZDIBugs

TheZDIBugs posts on X about $4704t, microsoft the most. They currently have XXXXX followers and XXX posts still getting attention that total XXX engagements in the last XX hours.

### Engagements: XXX [#](/creator/twitter::1518982517562429441/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1518982517562429441/c:line/m:interactions.svg)

- X Week XXXXX -XX%
- X Month XXXXXX +208%
- X Months XXXXXXX +16%
- X Year XXXXXXX -XX%

### Mentions: X [#](/creator/twitter::1518982517562429441/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1518982517562429441/c:line/m:posts_active.svg)


### Followers: XXXXX [#](/creator/twitter::1518982517562429441/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1518982517562429441/c:line/m:followers.svg)

- X Week XXXXX +0.36%
- X Month XXXXX +2.10%
- X Months XXXXX +14%
- X Year XXXXX +32%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::1518982517562429441/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1518982517562429441/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::1518982517562429441/influence)
---

**Social category influence**
[stocks](/list/stocks)  [technology brands](/list/technology-brands) 

**Social topic influence**
[$4704t](/topic/$4704t), [microsoft](/topic/microsoft)

**Top assets mentioned**
[Microsoft Corp. (MSFT)](/topic/microsoft)
### Top Social Posts [#](/creator/twitter::1518982517562429441/posts)
---
Top posts by engagements in the last XX hours

"ZDI-25-651CVE-2025-38350 (Pwn2Own) Red Hat Enterprise Linux CBS Packet Scheduling Use-After-Free Local Privilege Escalation Vulnerability (CVSS 8.8; Credit: Gerrard Tai of STAR Labs SG Pte. Ltd.)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1948834546964726124) 2025-07-25 19:55:38 UTC 4800 followers, XXX engagements


"ZDI-25-416CVE-2025-6445 ServiceStack FindType Directory Traversal Remote Code Execution Vulnerability (CVSS 8.1; Credit: Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1942301344099876990) 2025-07-07 19:15:01 UTC 4798 followers, 2048 engagements


"ZDI-25-609CVE-2025-20281 Cisco Identity Services Engine invokeStrongSwanShellScript Command Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Bobby Gould (@bobbygould5) of Trend Zero Day Initiative)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1945922147878130014) 2025-07-17 19:02:48 UTC 4800 followers, 6244 engagements


"ZDI-25-653CVE-2025-53770 (Pwn2Own) Microsoft SharePoint Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 8.8; Credit: Viettel Cyber Security)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1948834549284196397) 2025-07-25 19:55:38 UTC 4800 followers, XXX engagements


"ZDI-25-621CVE-2025-25269 (Pwn2Own) Phoenix Contact CHARX SEC-3150 DHCP Configuration Command Injection Remote Code Execution Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1947377227978432753) 2025-07-21 19:24:46 UTC 4800 followers, XXX engagements


"ZDI-25-652CVE-2025-53771 (Pwn2Own) Microsoft SharePoint ToolPane Authentication Bypass Vulnerability (CVSS 6.5; Credit: Viettel Cyber Security)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1948834548235559364) 2025-07-25 19:55:38 UTC 4800 followers, 1000 engagements


"ZDI-25-607CVE-2025-20337 Cisco Identity Services Engine enableStrongSwanTunnel Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 9.8; Credit: Kentaro Kawane of GMO Cybersecurity by Ierae)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1945922145592160352) 2025-07-17 19:02:47 UTC 4800 followers, 3895 engagements


"ZDI-25-650CVE-2025-6685 ATEN eco DC Missing Authorization Privilege Escalation Vulnerability (CVSS 8.8; Credit: Vu Khanh Trinh (@_Sonicrr) from VNPT Cyber Immunity)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1948834584965050627) 2025-07-25 19:55:47 UTC 4800 followers, XXX engagements


"ZDI-25-622CVE-2025-25268 (Pwn2Own) Phoenix Contact CHARX SEC-3150 Configuration Service Missing Authentication Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1947377229182234760) 2025-07-21 19:24:46 UTC 4800 followers, XXX engagements


"ZDI-25-449CVE-2025-6811 (0Day) Mescius TypeResolutionService Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 9.8; Credit: Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative)"  
![@TheZDIBugs Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1518982517562429441.png) [@TheZDIBugs](/creator/x/TheZDIBugs) on [X](/post/tweet/1940854513625186552) 2025-07-03 19:25:50 UTC 4798 followers, 1179 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@TheZDIBugs Avatar @TheZDIBugs TheZDIBugs

TheZDIBugs posts on X about $4704t, microsoft the most. They currently have XXXXX followers and XXX posts still getting attention that total XXX engagements in the last XX hours.

Engagements: XXX #

Engagements Line Chart

  • X Week XXXXX -XX%
  • X Month XXXXXX +208%
  • X Months XXXXXXX +16%
  • X Year XXXXXXX -XX%

Mentions: X #

Mentions Line Chart

Followers: XXXXX #

Followers Line Chart

  • X Week XXXXX +0.36%
  • X Month XXXXX +2.10%
  • X Months XXXXX +14%
  • X Year XXXXX +32%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence stocks technology brands

Social topic influence $4704t, microsoft

Top assets mentioned Microsoft Corp. (MSFT)

Top Social Posts #


Top posts by engagements in the last XX hours

"ZDI-25-651CVE-2025-38350 (Pwn2Own) Red Hat Enterprise Linux CBS Packet Scheduling Use-After-Free Local Privilege Escalation Vulnerability (CVSS 8.8; Credit: Gerrard Tai of STAR Labs SG Pte. Ltd.)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-25 19:55:38 UTC 4800 followers, XXX engagements

"ZDI-25-416CVE-2025-6445 ServiceStack FindType Directory Traversal Remote Code Execution Vulnerability (CVSS 8.1; Credit: Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-07 19:15:01 UTC 4798 followers, 2048 engagements

"ZDI-25-609CVE-2025-20281 Cisco Identity Services Engine invokeStrongSwanShellScript Command Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Bobby Gould (@bobbygould5) of Trend Zero Day Initiative)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-17 19:02:48 UTC 4800 followers, 6244 engagements

"ZDI-25-653CVE-2025-53770 (Pwn2Own) Microsoft SharePoint Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 8.8; Credit: Viettel Cyber Security)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-25 19:55:38 UTC 4800 followers, XXX engagements

"ZDI-25-621CVE-2025-25269 (Pwn2Own) Phoenix Contact CHARX SEC-3150 DHCP Configuration Command Injection Remote Code Execution Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-21 19:24:46 UTC 4800 followers, XXX engagements

"ZDI-25-652CVE-2025-53771 (Pwn2Own) Microsoft SharePoint ToolPane Authentication Bypass Vulnerability (CVSS 6.5; Credit: Viettel Cyber Security)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-25 19:55:38 UTC 4800 followers, 1000 engagements

"ZDI-25-607CVE-2025-20337 Cisco Identity Services Engine enableStrongSwanTunnel Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 9.8; Credit: Kentaro Kawane of GMO Cybersecurity by Ierae)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-17 19:02:47 UTC 4800 followers, 3895 engagements

"ZDI-25-650CVE-2025-6685 ATEN eco DC Missing Authorization Privilege Escalation Vulnerability (CVSS 8.8; Credit: Vu Khanh Trinh (@_Sonicrr) from VNPT Cyber Immunity)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-25 19:55:47 UTC 4800 followers, XXX engagements

"ZDI-25-622CVE-2025-25268 (Pwn2Own) Phoenix Contact CHARX SEC-3150 Configuration Service Missing Authentication Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-21 19:24:46 UTC 4800 followers, XXX engagements

"ZDI-25-449CVE-2025-6811 (0Day) Mescius TypeResolutionService Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 9.8; Credit: Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative)"
@TheZDIBugs Avatar @TheZDIBugs on X 2025-07-03 19:25:50 UTC 4798 followers, 1179 engagements

@TheZDIBugs
/creator/twitter::TheZDIBugs