Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1906665383723208704.png) @pdnuclei_bot pdnuclei-bot

pdnuclei-bot posts on X about wor, listing the most. They currently have XXX followers and XXX posts still getting attention that total XX engagements in the last XX hours.

### Engagements: XX [#](/creator/twitter::1906665383723208704/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:interactions.svg)

- X Week XXXXX -XX%
- X Month XXXXXX +187%

### Mentions: X [#](/creator/twitter::1906665383723208704/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:posts_active.svg)


### Followers: XXX [#](/creator/twitter::1906665383723208704/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:followers.svg)

- X Week XXX +12%
- X Month XXX +62%

### CreatorRank: undefined [#](/creator/twitter::1906665383723208704/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::1906665383723208704/influence)
---

**Social category influence**
[stocks](/list/stocks)  [technology brands](/list/technology-brands) 

**Social topic influence**
[wor](/topic/wor), [listing](/topic/listing)
### Top Social Posts [#](/creator/twitter::1906665383723208704/posts)
---
Top posts by engagements in the last XX hours

"🚨 CVE-2025-53833 - critical 🚨 LaRecipe 2.8.1 Remote Code Execution via SSTI LaRecipe is an application that allows users to create documentation with Markdown in. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945408075684315254) 2025-07-16 09:00:03 UTC XXX followers, XXX engagements


"🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945876156240318903) 2025-07-17 16:00:02 UTC XXX followers, XXX engagements


"🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1943988729884160397) 2025-07-12 11:00:05 UTC XXX followers, XXX engagements


"🚨 CVE-2025-5777 - critical 🚨 Citrix NetScaler Memory Disclosure - CitrixBleed X Insufficient input validation leading to memory overreadon the NetScaler Management . 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1941421808554738058) 2025-07-05 09:00:03 UTC XXX followers, 18.1K engagements


"🚨 CVE-2025-6851 - high 🚨 WordPress Broken Link Notifier 1.3.1 - Unauthenticated SSRF The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Fo. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945423179050307846) 2025-07-16 10:00:04 UTC XXX followers, XXX engagements


"🚨 CVE-2025-27505 - medium 🚨 GeoServer - Missing Authorization on REST API Index GeoServer contains a missing authorization vulnerability that allows unauthorized acc. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1944653110657642837) 2025-07-14 07:00:06 UTC XXX followers, XXX engagements


"🚨 CVE-2025-2010 - critical 🚨 WordPress JobWP Plugin = 2.3.9 - SQL Injection The JobWP - Job Board Job Listing Career Page and Recruitment Plugin plugin for Wor. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1942856260145275118) 2025-07-09 08:00:03 UTC XXX followers, 1637 engagements


"🚨 CVE-2020-29390 - critical 🚨 Zeroshell 3.9.3 - Command Injection Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet S. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945453381851754782) 2025-07-16 12:00:05 UTC XXX followers, XXX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@pdnuclei_bot Avatar @pdnuclei_bot pdnuclei-bot

pdnuclei-bot posts on X about wor, listing the most. They currently have XXX followers and XXX posts still getting attention that total XX engagements in the last XX hours.

Engagements: XX #

Engagements Line Chart

  • X Week XXXXX -XX%
  • X Month XXXXXX +187%

Mentions: X #

Mentions Line Chart

Followers: XXX #

Followers Line Chart

  • X Week XXX +12%
  • X Month XXX +62%

CreatorRank: undefined #

CreatorRank Line Chart

Social Influence #


Social category influence stocks technology brands

Social topic influence wor, listing

Top Social Posts #


Top posts by engagements in the last XX hours

"🚨 CVE-2025-53833 - critical 🚨 LaRecipe 2.8.1 Remote Code Execution via SSTI LaRecipe is an application that allows users to create documentation with Markdown in. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-16 09:00:03 UTC XXX followers, XXX engagements

"🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-17 16:00:02 UTC XXX followers, XXX engagements

"🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-12 11:00:05 UTC XXX followers, XXX engagements

"🚨 CVE-2025-5777 - critical 🚨 Citrix NetScaler Memory Disclosure - CitrixBleed X Insufficient input validation leading to memory overreadon the NetScaler Management . 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-05 09:00:03 UTC XXX followers, 18.1K engagements

"🚨 CVE-2025-6851 - high 🚨 WordPress Broken Link Notifier 1.3.1 - Unauthenticated SSRF The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Fo. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-16 10:00:04 UTC XXX followers, XXX engagements

"🚨 CVE-2025-27505 - medium 🚨 GeoServer - Missing Authorization on REST API Index GeoServer contains a missing authorization vulnerability that allows unauthorized acc. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-14 07:00:06 UTC XXX followers, XXX engagements

"🚨 CVE-2025-2010 - critical 🚨 WordPress JobWP Plugin = 2.3.9 - SQL Injection The JobWP - Job Board Job Listing Career Page and Recruitment Plugin plugin for Wor. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-09 08:00:03 UTC XXX followers, 1637 engagements

"🚨 CVE-2020-29390 - critical 🚨 Zeroshell 3.9.3 - Command Injection Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet S. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-16 12:00:05 UTC XXX followers, XXX engagements

@pdnuclei_bot
/creator/twitter::pdnuclei_bot