[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @pdnuclei_bot pdnuclei-bot pdnuclei-bot posts on X about plugin, vmware the most. They currently have XXX followers and XX posts still getting attention that total XXX engagements in the last XX hours. ### Engagements: XXX [#](/creator/twitter::1906665383723208704/interactions)  - X Week XXXXX -XX% - X Month XXXXXX +161% ### Mentions: X [#](/creator/twitter::1906665383723208704/posts_active)  - X Week XX -XX% - X Month XX +4% ### Followers: XXX [#](/creator/twitter::1906665383723208704/followers)  - X Week XXX +11% - X Month XXX +59% ### CreatorRank: XXXXXXXXX [#](/creator/twitter::1906665383723208704/influencer_rank)  ### Social Influence [#](/creator/twitter::1906665383723208704/influence) --- **Social category influence** [technology brands](/list/technology-brands) XXXX% [stocks](/list/stocks) XXXX% **Social topic influence** [plugin](/topic/plugin) 4.55%, [vmware](/topic/vmware) XXXX% **Top accounts mentioned or mentioned by** [@pdnuclei](/creator/undefined) ### Top Social Posts [#](/creator/twitter::1906665383723208704/posts) --- Top posts by engagements in the last XX hours "🚨 CVE-2025-2710 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945785563052917163) 2025-07-17 10:00:03 UTC XXX followers, XXX engagements "🚨 CVE-2025-6058 - critical 🚨 WPBookit = 1.0.4 - Unauthenticated Arbitrary File Upload The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to miss. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1947567312510628236) 2025-07-22 08:00:06 UTC XXX followers, XXX engagements "🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945876156240318903) 2025-07-17 16:00:02 UTC XXX followers, XXX engagements "🚨 CVE-2025-2711 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945800663486939605) 2025-07-17 11:00:04 UTC XXX followers, XXX engagements "🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1943988729884160397) 2025-07-12 11:00:05 UTC XXX followers, XXX engagements "🚨 CVE-2024-36675 - high 🚨 LyLme spage v1.9.5 - Server-Side Request Forgery LyLme spage v1.9.5 is vulnerable to server-side request forgery (SSRF) via the url pa. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1946887826718802309) 2025-07-20 11:00:03 UTC XXX followers, XXX engagements "🚨 CVE-2019-5544 - critical 🚨 VMware ESXi SLP - Heap Overflow DoS OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. V. 👾 @pdnuclei #NucleiTemplates #cve"  [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1946902924971716649) 2025-07-20 12:00:03 UTC XXX followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
pdnuclei-bot posts on X about plugin, vmware the most. They currently have XXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.
Social category influence technology brands XXXX% stocks XXXX%
Social topic influence plugin 4.55%, vmware XXXX%
Top accounts mentioned or mentioned by @pdnuclei
Top posts by engagements in the last XX hours
"🚨 CVE-2025-2710 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-17 10:00:03 UTC XXX followers, XXX engagements
"🚨 CVE-2025-6058 - critical 🚨 WPBookit = 1.0.4 - Unauthenticated Arbitrary File Upload The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to miss. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-22 08:00:06 UTC XXX followers, XXX engagements
"🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl" @pdnuclei_bot on X 2025-07-17 16:00:02 UTC XXX followers, XXX engagements
"🚨 CVE-2025-2711 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-17 11:00:04 UTC XXX followers, XXX engagements
"🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-12 11:00:05 UTC XXX followers, XXX engagements
"🚨 CVE-2024-36675 - high 🚨 LyLme spage v1.9.5 - Server-Side Request Forgery LyLme spage v1.9.5 is vulnerable to server-side request forgery (SSRF) via the url pa. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-20 11:00:03 UTC XXX followers, XXX engagements
"🚨 CVE-2019-5544 - critical 🚨 VMware ESXi SLP - Heap Overflow DoS OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. V. 👾 @pdnuclei #NucleiTemplates #cve" @pdnuclei_bot on X 2025-07-20 12:00:03 UTC XXX followers, XXX engagements
/creator/x::pdnuclei_bot