Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1906665383723208704.png) @pdnuclei_bot pdnuclei-bot

pdnuclei-bot posts on X about plugin, vmware the most. They currently have XXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.

### Engagements: XXX [#](/creator/twitter::1906665383723208704/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:interactions.svg)

- X Week XXXXX -XX%
- X Month XXXXXX +161%

### Mentions: X [#](/creator/twitter::1906665383723208704/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:posts_active.svg)

- X Week XX -XX%
- X Month XX +4%

### Followers: XXX [#](/creator/twitter::1906665383723208704/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:followers.svg)

- X Week XXX +11%
- X Month XXX +59%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::1906665383723208704/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1906665383723208704/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::1906665383723208704/influence)
---

**Social category influence**
[technology brands](/list/technology-brands)  XXXX% [stocks](/list/stocks)  XXXX%

**Social topic influence**
[plugin](/topic/plugin) 4.55%, [vmware](/topic/vmware) XXXX%

**Top accounts mentioned or mentioned by**
[@pdnuclei](/creator/undefined)
### Top Social Posts [#](/creator/twitter::1906665383723208704/posts)
---
Top posts by engagements in the last XX hours

"🚨 CVE-2025-2710 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945785563052917163) 2025-07-17 10:00:03 UTC XXX followers, XXX engagements


"🚨 CVE-2025-6058 - critical 🚨 WPBookit = 1.0.4 - Unauthenticated Arbitrary File Upload The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to miss. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1947567312510628236) 2025-07-22 08:00:06 UTC XXX followers, XXX engagements


"🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945876156240318903) 2025-07-17 16:00:02 UTC XXX followers, XXX engagements


"🚨 CVE-2025-2711 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1945800663486939605) 2025-07-17 11:00:04 UTC XXX followers, XXX engagements


"🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1943988729884160397) 2025-07-12 11:00:05 UTC XXX followers, XXX engagements


"🚨 CVE-2024-36675 - high 🚨 LyLme spage v1.9.5 - Server-Side Request Forgery LyLme spage v1.9.5 is vulnerable to server-side request forgery (SSRF) via the url pa. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1946887826718802309) 2025-07-20 11:00:03 UTC XXX followers, XXX engagements


"🚨 CVE-2019-5544 - critical 🚨 VMware ESXi SLP - Heap Overflow DoS OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. V. 👾 @pdnuclei #NucleiTemplates #cve"  
![@pdnuclei_bot Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::1906665383723208704.png) [@pdnuclei_bot](/creator/x/pdnuclei_bot) on [X](/post/tweet/1946902924971716649) 2025-07-20 12:00:03 UTC XXX followers, XXX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@pdnuclei_bot Avatar @pdnuclei_bot pdnuclei-bot

pdnuclei-bot posts on X about plugin, vmware the most. They currently have XXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.

Engagements: XXX #

Engagements Line Chart

  • X Week XXXXX -XX%
  • X Month XXXXXX +161%

Mentions: X #

Mentions Line Chart

  • X Week XX -XX%
  • X Month XX +4%

Followers: XXX #

Followers Line Chart

  • X Week XXX +11%
  • X Month XXX +59%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands XXXX% stocks XXXX%

Social topic influence plugin 4.55%, vmware XXXX%

Top accounts mentioned or mentioned by @pdnuclei

Top Social Posts #


Top posts by engagements in the last XX hours

"🚨 CVE-2025-2710 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-17 10:00:03 UTC XXX followers, XXX engagements

"🚨 CVE-2025-6058 - critical 🚨 WPBookit = 1.0.4 - Unauthenticated Arbitrary File Upload The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to miss. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-22 08:00:06 UTC XXX followers, XXX engagements

"🚨 CVE-2025-34300 - critical 🚨 SawtoothSoftware Lighthouse Studio 9.16.14 - Pre-Auth Remote Code Execution A pre-authentication remote code execution vulnerability exists in Sawtooth Software. 👾 @pdnuclei #Nucl"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-17 16:00:02 UTC XXX followers, XXX engagements

"🚨 CVE-2025-2711 - medium 🚨 Yonyou UFIDA ERP-NC V5.0 - Cross-Site Scripting Yonyou UFIDA ERP-NC V5.0 is vulnerable to reflected cross-site scripting (XSS) via th. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-17 11:00:04 UTC XXX followers, XXX engagements

"🚨 CVE-2022-42475 - critical 🚨 Fortinet SSL-VPN - Heap-Based Buffer Overflow A heap-based buffer overflow vulnerability CWE-122 in FortiOS SSL-VPN (versions XXX. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-12 11:00:05 UTC XXX followers, XXX engagements

"🚨 CVE-2024-36675 - high 🚨 LyLme spage v1.9.5 - Server-Side Request Forgery LyLme spage v1.9.5 is vulnerable to server-side request forgery (SSRF) via the url pa. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-20 11:00:03 UTC XXX followers, XXX engagements

"🚨 CVE-2019-5544 - critical 🚨 VMware ESXi SLP - Heap Overflow DoS OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. V. 👾 @pdnuclei #NucleiTemplates #cve"
@pdnuclei_bot Avatar @pdnuclei_bot on X 2025-07-20 12:00:03 UTC XXX followers, XXX engagements

creator/x::pdnuclei_bot
/creator/x::pdnuclei_bot