The dataset viewer should be available soon. Please retry later.
unified_id string | source_dataset string | source_file string | source_format string | source_layer string | source_record_id string | forum_id string | timestamp string | author_hash string | text string | text_raw string | text_length int64 | text_raw_length int64 | text_sha256 string | text_raw_sha256 string | thread_url string | thread_title string | section string | post_index int64 | post_id string | thread_id string | scraped_at string | reply_count int64 | view_count int64 | tags list | cve_refs list | dataset_generated_at string | release_mode string | released_artifact string | redaction_reason string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
9ef2ea06af5776baf8910574 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | d14d6d8bc2d9dbb4de19 | nvd_cve | 2009-02-26T16:17:20.170000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2009-0623: Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet. | CVE-2009-0623: Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:27.113957+00:00 | redistributable_text | text | null |
ed367e6d7780add0630fd46a | gayanku_posts | data/gayanku_posts.jsonl | forumpost | hacker_community | cc9acf1ba48038957a68 | gayanku_darkweb | 2014-01-31T13:17:26+00:00 | 9c667327c431ac169abce3f8301d23c5141fece25da34187c32a6337 | [Evolution] UK Carders
Hey guys,Are there any specific forums for UK Carders? Im not really into the carding scene more into bank drops and transferring funds.I cant seem to find any legit login sellers at the moment, and dont want to spend $50 at TCF to find out that they dont have any there either.Anyone from the ... | [Evolution] UK Carders
Hey guys,Are there any specific forums for UK Carders? Im not really into the carding scene more into bank drops and transferring funds.I cant seem to find any legit login sellers at the moment, and dont want to spend $50 at TCF to find out that they dont have any there either.Anyone from the ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:47:15.313407+00:00 | research_text_with_terms | research_text | null |
cd4501079c348232e3af902a | gayanku_posts | data/gayanku_posts.jsonl | forumpost | hacker_community | c99cc38db89326e20256 | gayanku_darkweb | 2012-03-11T05:40:00+00:00 | d14254d6d34ea106afd5a5dd7c6b37ab37fd12804ad99348dea6ce38 | Re: SilkRoad Stock: The New NYSE *ahem SRSE*
Quote from: SouthSquareBiz on March 11, 2012, 03:55 amQuote from: anarcho47 on March 08, 2012, 10:39 pmQuote from: Nikodym on March 05, 2012, 05:56 amAccording to financial theory, any security is worth it for the right price, what kind of div yield we talkin? I can see the... | [Silk Road 1] Re: SilkRoad Stock: The New NYSE *ahem SRSE*
Quote from: SouthSquareBiz on March 11, 2012, 03:55 amQuote from: anarcho47 on March 08, 2012, 10:39 pmQuote from: Nikodym on March 05, 2012, 05:56 amAccording to financial theory, any security is worth it for the right price, what kind of div yield we talkin?... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:49:24.279745+00:00 | research_text_with_terms | research_text | null |
14fb189913dd3b506838cfa5 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 527edcade76bcd709545 | exploit_db | 2010-11-02T00:00:00+00:00 | dfac0d6e4c35a8aa16e26262130b1e352f68644f12994d3571befa5f923cae5e | BroadWorks - Call Detail Record Security Bypass
source: <URL>
BroadWorks is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and to obtain sensitive information. Successful exploits will enable the attacker to monitor the incoming and outgoing call... | BroadWorks - Call Detail Record Security Bypass
source: https://www.securityfocus.com/bid/44597/info
BroadWorks is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and to obtain sensitive information. Successful exploits will enable the attacker to ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:46.876131+00:00 | redistributable_text | text | null |
e29e946a901cab9b17ab49f8 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 23f3e8cfb259caf46b84 | nvd_cve | 2008-11-10T15:23:29.517000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2008-5026: Microsoft SharePoint uses URLs with the same hostname and port number for a web site's primary files and individual users' uploaded files (aka attachments), which allows remote authenticated users to leverage same-origin relationships and conduct cross-site scripting (XSS) attacks by uploading HTML docum... | CVE-2008-5026: Microsoft SharePoint uses URLs with the same hostname and port number for a web site's primary files and individual users' uploaded files (aka attachments), which allows remote authenticated users to leverage same-origin relationships and conduct cross-site scripting (XSS) attacks by uploading HTML docum... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:26.683878+00:00 | redistributable_text | text | null |
12abea91a5b9afcb340249bd | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | b2fb68c679b9970a162c | exploitdb_hf | 2000-01-01T00:00:00+00:00 | fc844ec3be80f9a4696afc31015fdf6b2ef31d8720c395b341f9c64cfa2b365e | CMS Made Simple 1.2 - Remote Code Execution
This is a webapps exploit for php platform. Description: CMS Made Simple 1.2 - Remote Code Execution. Author: irk4z | CMS Made Simple 1.2 - Remote Code Execution
This is a webapps exploit for php platform. Description: CMS Made Simple 1.2 - Remote Code Execution. Author: irk4z | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:24.225691+00:00 | research_text_with_terms | research_text | null |
5cbec18060cd85d4367f0e0b | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | 09b93629068d49e7e203 | github_advisory | 2024-01-09T18:25:47+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability
### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone leveraging the <CODE> protocol or the <CODE> is vulnerable. Microsoft.IdentityModel trusts the <CODE> claim by default for the <CODE> protocol. This raises t... | Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability
[Severity: HIGH]
### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:09.667814+00:00 | redistributable_text | text | null |
8f7e21f7f162b114b3205bc0 | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | 058bc41521de80572fe0 | github_advisory | 2021-10-04T20:12:30+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper clas... | Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils
[Severity: CRITICAL]
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The Binar... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:12.704107+00:00 | redistributable_text | text | null |
91f1b9a9a7619cd9bbe5691d | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | e974954b02191663fb21 | nvd_cve | 2008-08-27T15:21:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2008-3745: The Upload module in Drupal 6.x before 6.4 allows remote authenticated users to edit nodes, delete files, and download unauthorized attachments via unspecified vectors. | CVE-2008-3745: The Upload module in Drupal 6.x before 6.4 allows remote authenticated users to edit nodes, delete files, and download unauthorized attachments via unspecified vectors. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:26.400485+00:00 | redistributable_text | text | null |
466c62d9a808516e3abaafa6 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 36f6065b17f8647ffffb | nvd_cve | 2007-03-30T01:19:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2007-1776: SQL injection vulnerability in index.php in the DesignForJoomla.com D4J eZine (com_ezine) 2.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the article parameter in a read action. | CVE-2007-1776: SQL injection vulnerability in index.php in the DesignForJoomla.com D4J eZine (com_ezine) 2.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the article parameter in a read action. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:23.754046+00:00 | redistributable_text | text | null |
a6bc2e343e2d8e126eee8efe | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | e93e3bea24e93a771185 | github_advisory | 2026-01-13T20:37:09+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State
### Summary
**Description**
A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic b... | Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State
[Severity: HIGH]
### Summary
**Description**
A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:06.986613+00:00 | redistributable_text | text | null |
b3e89967574d961065da6125 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 8be4cca4d1771f22ab72 | exploit_db | 2021-09-21T00:00:00+00:00 | bc8b1864e0165812387f60c638f5d797a8ea475e2623556b034f8686b462100b | WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated)
# Exploit Title: WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated)
# Date: 18-09-2021
# Exploit Author: Halit AKAYDIN (hLtAkydn)
# Vendor Homepage: <URL>
# Software Link: <URL>
# Version: 2.13.0
# Category: Webapps
# Tested on: Linux/W... | WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated)
# Exploit Title: WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated)
# Date: 18-09-2021
# Exploit Author: Halit AKAYDIN (hLtAkydn)
# Vendor Homepage: https://websitebaker.org/
# Software Link: http://wiki.websitebaker.org/doku.php/en/downl... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:56.940857+00:00 | redistributable_text | text | null |
15306ca798e9cb3837fdb3ce | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | cf83af40dd1f4ef07659 | nvd_cve | 2025-05-08T07:15:54.437000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2025-37832: Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | CVE-2025-37832: Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:10:16.779546+00:00 | redistributable_text | text | null |
7b33e787a6f90b3cdd1260aa | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 2a95f98bb6f32ed5966d | exploitdb_hf | 2000-01-01T00:00:00+00:00 | d1f3b69c14a7c9b6e12f455825a5d7e28dfce2a5063a072936574e8e42c26f98 | Samba 3.5.11/3.6.3 - Remote Code Execution
This is a remote exploit for linux platform. Description: Samba 3.5.11/3.6.3 - Remote Code Execution. Author: kb | Samba 3.5.11/3.6.3 - Remote Code Execution
This is a remote exploit for linux platform. Description: Samba 3.5.11/3.6.3 - Remote Code Execution. Author: kb | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:39.195347+00:00 | research_text_with_terms | research_text | null |
41834afcb7eddb878647a587 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | cc831b0738d381ae0bd7 | exploit_db | 2017-05-03T00:00:00+00:00 | 0f288d6077b50f4a67494bc8a2414323af7bfaf56b26967afa66bc1e2c9f1e78 | WordPress Core < 4.7.4 - Unauthorized Password Reset
=============================================
- Discovered by: Dawid Golunski
- dawid[at]legalhackers.com
- <URL>
- CVE-2017-8295
- Release date: 03.05.2017
- Revision 1.0
- Severity: Medium/High
=============================================
Source: <URL>
If an... | WordPress Core < 4.7.4 - Unauthorized Password Reset
=============================================
- Discovered by: Dawid Golunski
- dawid[at]legalhackers.com
- https://legalhackers.com
- CVE-2017-8295
- Release date: 03.05.2017
- Revision 1.0
- Severity: Medium/High
=============================================
Sou... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:46.145947+00:00 | redistributable_text | text | null |
a9f37aeee55acc6d7de88d1b | kaeli_hacker_posts | data/kaeli_hacker_posts.jsonl | forumpost | hacker_community | 7918a063ae705583753f | antionline | 2006-05-10T13:47:00+00:00 | 5f9edd892da192bbbe4a9f258b5f86c8e4c0e2d8b573866273518afd1eba7101 | cain&able help
well, my specs are more than enough for the program, but I was running xp and I think I got the 98 version. I downloaded the xp version and it works just fine. Problem solved
None | cain&able help
well, my specs are more than enough for the program, but I was running xp and I think I got the 98 version. I downloaded the xp version and it works just fine. Problem solved
None | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:06:48.628844+00:00 | research_text_with_terms | research_text | null |
5c460049f5ef2d46ea55c53a | hacker_exploits_posts | data/hacker_exploits_posts.jsonl | forumpost | hacker_community | e8538c299d4b54a36cc2 | antichat | 2009-01-21T00:00:00+00:00 | 3a1845822b3d9ed5179157015e037a997bb4ac7e8461b565fe9e5bb3b28d22da | Jimm
научится читать и перестать тупить | Jimm
научится читать и перестать тупить | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:58:38.293175+00:00 | research_text_with_terms | research_text | null |
c20dfac4f86f9813f8198d4a | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 2241bd4c1f98b6acf5c4 | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 615557f2492feea1062d96708632d20e15edd925082d04f2a25bb2cde3cc7de2 | Flatpress 0.804 < 0.812.1 - Local File Inclusion
This is a webapps exploit for php platform. Description: Flatpress 0.804 < 0.812.1 - Local File Inclusion. Author: Giuseppe Fuggiano | Flatpress 0.804 < 0.812.1 - Local File Inclusion
This is a webapps exploit for php platform. Description: Flatpress 0.804 < 0.812.1 - Local File Inclusion. Author: Giuseppe Fuggiano | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:27.550757+00:00 | research_text_with_terms | research_text | null |
81f087fb0e6fada1a332884b | gayanku_posts | data/gayanku_posts.jsonl | forumpost | hacker_community | 3028120d5416786bdd8e | gayanku_darkweb | 2013-10-10T00:00:00+00:00 | 6961cff603e7e889e890ea01bdc9cfcf583cea82a13ba69a7ac97bed | NEVER click on LINKS on the FORUM or SHOP to CLEARNET sites!
Maxenergy, those are not reasons to not browse the clearnet. The fbi could set up a hidden service the same way to take down an exit node. But that is all they will get, an exit node. And new tor browsers are not susceptible to java-script exploits. also the... | [Black Market Reloaded] NEVER click on LINKS on the FORUM or SHOP to CLEARNET sites!
Maxenergy, those are not reasons to not browse the clearnet. The fbi could set up a hidden service the same way to take down an exit node. But that is all they will get, an exit node. And new tor browsers are not susceptible to java-s... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:47:11.995359+00:00 | research_text_with_terms | research_text | null |
bb95dab7ec2d9409f158aeee | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 8261f72daa225260250b | nvd_cve | 2009-12-10T22:30:00.657000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2009-4181: Stack-based buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via vectors involving the sel and arg parameters to jovgraph.exe. | CVE-2009-4181: Stack-based buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via vectors involving the sel and arg parameters to jovgraph.exe. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:28.001916+00:00 | redistributable_text | text | null |
e95044a4e99b02663a1d7159 | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 21d8237c8b7bb468b89e | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 1d80fb9f8e31857e7ecf8a9c99a9fe3ff518d54e41fa4ed8cf2ac780a22d8884 | Joomla! Component File Download Tracker 3.0 - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan | Joomla! Component File Download Tracker 3.0 - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:41.423757+00:00 | research_text_with_terms | research_text | null |
c52b7a9b429677a1050a38ba | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 52d5cb795b28ace3175b | nvd_cve | 2006-04-20T18:06:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2006-1929: PHP remote file inclusion vulnerability in include/common.php in I-Rater Platinum allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter. | CVE-2006-1929: PHP remote file inclusion vulnerability in include/common.php in I-Rater Platinum allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:21.295425+00:00 | redistributable_text | text | null |
e04eeac348c69c1678ffbfe1 | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 04a002d8eda00bb2d0cc | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 330b3dcff417c946924d7217ff3ba1b72abb0e1e15d3bfdff0be7d6484fadce6 | Analyze the security implications of: ACollab - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium | Analyze the security implications of: ACollab - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:35.094000+00:00 | research_text_with_terms | research_text | null |
2f012e055e2de84dca0f2e86 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 6a0abe9574d28c0dad3c | exploit_db | 2018-07-02T00:00:00+00:00 | 5d167dd5fa6549333f5022adba42b0503de13c3873bd44bb12ba86a4c274e45d | VMware NSX SD-WAN Edge < 3.1.2 - Command Injection
#!/usr/bin/env python
# Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud
# Date: 2018-06-29
# Exploit Author: paragonsec @ Critical Start
# Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start
# Vendor Home... | VMware NSX SD-WAN Edge < 3.1.2 - Command Injection
#!/usr/bin/env python
# Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud
# Date: 2018-06-29
# Exploit Author: paragonsec @ Critical Start
# Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start
# Vendor Home... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:44.106279+00:00 | redistributable_text | text | null |
7e6325f4cbe0d66f57935bf9 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 631501cedcce00a92b3c | exploit_db | 2000-08-15T00:00:00+00:00 | fb19abfc56211aef5e8156019b8b2797883eb9de01cef8e55570a304b1968711 | David Bagley xlock 4.16 - User Supplied Format String (1)
// source: <URL>
A vulnerability exists in versions of the xlockmore program, originally written by David Bagley. It is believed to affect all versions of xlock derived from xlockmore. This includes the xlock shipped with a number of popular operating systems... | David Bagley xlock 4.16 - User Supplied Format String (1)
// source: https://www.securityfocus.com/bid/1585/info
A vulnerability exists in versions of the xlockmore program, originally written by David Bagley. It is believed to affect all versions of xlock derived from xlockmore. This includes the xlock shipped with ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:58.718838+00:00 | redistributable_text | text | null |
daaa0520386494e81044c0f0 | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | 8616e9c841196979aa0a | github_advisory | 2024-04-05T15:39:19+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | whoami stack buffer overflow on several Unix platforms
With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris:
- <CODE>
- <CODE>
- <CODE>
- <CODE>
With versions of the whoami crate >= 0.5.3 and < 1.0.1, calling ... | whoami stack buffer overflow on several Unix platforms
[Severity: HIGH]
With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris:
- `whoami::username`
- `whoami::realname`
- `whoami::username_os`
- `whoami::realname_os`
... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:09.400762+00:00 | redistributable_text | text | null |
db8fa549898465fda5d1046f | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | c0fe9bd26f183efcd109 | nvd_cve | 2003-05-05T04:00:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2003-0196: Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201. | CVE-2003-0196: Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:18.307607+00:00 | redistributable_text | text | null |
1c42a04a2054b0c0c8748eba | hacker_exploits_posts | data/hacker_exploits_posts.jsonl | forumpost | hacker_community | 92bffeb7952eb0c8ff78 | antichat | 2007-07-25T00:00:00+00:00 | 87cefcef9cc1a505be68ed528a2e4bca71c0288e40f4471b8e6da91b837d58c0 | Пишем php-мейлер
Ты прав достойного скрипта для анонимной отправки нету, еси есть глючные какие то. А твой скрипт неплохой)). Просто с мейл ру у меня проблемы. Наверно из за хоста, так как на рамблер отправился.)))))Если кто нить знает адресс с поддержкой пхп и смтп то пожалуйста дайте мне знать.Еще я никогда не работ... | Пишем php-мейлер
Ты прав достойного скрипта для анонимной отправки нету, еси есть глючные какие то. А твой скрипт неплохой)). Просто с мейл ру у меня проблемы. Наверно из за хоста, так как на рамблер отправился.)))))Если кто нить знает адресс с поддержкой пхп и смтп то пожалуйста дайте мне знать.Еще я никогда не работ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:52:56.576513+00:00 | research_text_with_terms | research_text | null |
931a3050ec229bddc832af21 | hacker_exploits_posts | data/hacker_exploits_posts.jsonl | forumpost | hacker_community | f9da8e5980a8ed353c7b | antichat | 2026-04-15T22:00:55.398153+00:00 | db98f0b5ad634abeb0d13b38f49d795b99e6ea0f934a131f1d5da59b78eadbfd | Подскажите, что произошло и что это может быть за ссылка?
altblitz said:↑Тренировка футбольной команды школы в спорт.-зале Олимпийского Резерва.И чем же они там, в душе после тренировки, нагие Апполоны заняты друг с другом?Света в душе не было, для подростков. Тут и понесло.. <URL> to expand...да боже вас упаси, зачем... | Подскажите, что произошло и что это может быть за ссылка?
altblitz said:↑Тренировка футбольной команды школы в спорт.-зале Олимпийского Резерва.И чем же они там, в душе после тренировки, нагие Апполоны заняты друг с другом?Света в душе не было, для подростков. Тут и понесло..https://limona.xyz/ras/incest/3980.htmlClic... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:56:53.759803+00:00 | research_text_with_terms | research_text | null |
65ff39521819dbeb964add9b | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | a92607190b5d16184ace | nvd_cve | 2005-11-16T07:42:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2005-3544: Cross-site scripting (XSS) vulnerability in u2u.php in XMB 1.9.3 allows remote attackers to inject arbitrary web script or HTML via the username parameter. | CVE-2005-3544: Cross-site scripting (XSS) vulnerability in u2u.php in XMB 1.9.3 allows remote attackers to inject arbitrary web script or HTML via the username parameter. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:20.363151+00:00 | redistributable_text | text | null |
93ba1207780beb2601e3b6fa | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 71921dc8e22ef4dea45f | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 4efd15040764f7e5eda7baee26078bc728f2fb523b906974160f0d7b3d3da9aa | FloosieTek FTGate 2.1 - Web File Access
This is a remote exploit for multiple platform. Description: FloosieTek FTGate 2.1 - Web File Access. Author: Marc | FloosieTek FTGate 2.1 - Web File Access
This is a remote exploit for multiple platform. Description: FloosieTek FTGate 2.1 - Web File Access. Author: Marc | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:32.272589+00:00 | research_text_with_terms | research_text | null |
620512921c92e6cdc85f578a | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | c942492b65582f9e7fee | exploitdb_hf | 2000-01-01T00:00:00+00:00 | d6e41ac339f2771b27b05350f485a5111e4e9799700b0ec8513a9853b606a5f1 | Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting
This is a remote exploit for linux platform. Description: Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting. Author: Adam Muntner | Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting
This is a remote exploit for linux platform. Description: Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting. Author: Adam Muntner | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:40.583645+00:00 | research_text_with_terms | research_text | null |
18ca9b8c38a0904bafa0934b | cvefixes_posts | data/cvefixes_posts.jsonl | forumpost | fix_commit_reference | 64f74cf0dd894508efaf | cvefixes | 2022-02-28T10:15:00+00:00 | f3c3a2e92cd3f9da2215e1d34de274f962bef059e06edb9ceb54261ff686acdd | CVE: CVE-2022-0768
[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository rudloff/alltube prior to 3.0.2.'}]
Fix commit: Merge branch 'hotfix/3.0.2' | CVE: CVE-2022-0768
[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository rudloff/alltube prior to 3.0.2.'}]
Fix commit: Merge branch 'hotfix/3.0.2' | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:23.654359+00:00 | redistributable_text | text | null |
bb27e227f65569c77b1ead40 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 73430f89afcd3841ca33 | exploit_db | 2016-06-15T00:00:00+00:00 | 76c9255109c644e3818401a42ba17817fbaa6e89703ec032e1ecc8763a42ecd6 | Hyperoptic (Tilgin) Router HG23xx - Multiple Vulnerabilities
Hyperoptic (Tilgin) Router HG23xx Multiple XSS And CSRF Vulnerabilities
Vendor: Hyperoptic Ltd. | Tilgin AB
Product web page: <URL>
<URL>
Affected version: HG2330, HG2302 and HG2301
Summary: Tilgin's HG23xx family of products offers a flexible and
high ... | Hyperoptic (Tilgin) Router HG23xx - Multiple Vulnerabilities
Hyperoptic (Tilgin) Router HG23xx Multiple XSS And CSRF Vulnerabilities
Vendor: Hyperoptic Ltd. | Tilgin AB
Product web page: http://www.hyperoptic.com
http://www.tilgin.com
Affected version: HG2330, HG2302 and HG2301
Summary: Tilgin's H... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:43.865419+00:00 | redistributable_text | text | null |
b32cb2efb175e4fad7c0ca4b | hacker_exploits_posts | data/hacker_exploits_posts.jsonl | forumpost | hacker_community | 83cc6ae8fd32ad1ff1af | altenens | 2020-03-17T00:00:00+00:00 | 9c9fc0853a8564c7e78d0d15811435be18bd7fa1c5109919412af7e7b9c16ace | x200 POF.COM Dating Site Account with capture
thanks –•™Nostalgia™•– said: [Hidden content] Click to expand... | x200 POF.COM Dating Site Account with capture
thanks –•™Nostalgia™•– said: [Hidden content] Click to expand... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:02:56.727713+00:00 | research_text_with_terms | research_text | null |
99a720a39b0677ca890b630e | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 24315e30e7eadedf01ba | nvd_cve | 2006-05-01T19:06:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2006-2114: Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request. | CVE-2006-2114: Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:21.355292+00:00 | redistributable_text | text | null |
902d7c0f0ea07bc28e97be9c | evolution_posts | data/evolution_posts.jsonl | forumpost | hacker_community | aeeb3abd5e4be9c1a1f6 | evolution_darkweb | 2015-01-14T13:20:50+00:00 | 3c4e6d6cd7a659a75c6d3e80654b2bd7ef9a62a99fe7e9340232da56299745a0 | me too please:) | me too please:) | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:46:20.824690+00:00 | research_text_with_terms | research_text | null |
7539e4810d09b5d7ff171a17 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 1a4de17c77ee1e6dc5f2 | exploit_db | 2016-05-31T00:00:00+00:00 | 76c9255109c644e3818401a42ba17817fbaa6e89703ec032e1ecc8763a42ecd6 | Flatpress 1.0.3 - Cross-Site Request Forgery / Arbitrary File Upload
<!--
FlatPress 1.0.3 CSRF Arbitrary File Upload
Vendor: Edoardo Vacchi
Product web page: <URL>
Affected version: 1.0.3
Summary: FlatPress is a blogging engine that saves your posts as
simple text files. Forget about SQL! You just need some PHP... | Flatpress 1.0.3 - Cross-Site Request Forgery / Arbitrary File Upload
<!DOCTYPE html>
<!--
FlatPress 1.0.3 CSRF Arbitrary File Upload
Vendor: Edoardo Vacchi
Product web page: http://www.flatpress.org
Affected version: 1.0.3
Summary: FlatPress is a blogging engine that saves your posts as
simple text files. Forget... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:50.386475+00:00 | redistributable_text | text | null |
365634c98868105d252088ee | gayanku_posts | data/gayanku_posts.jsonl | forumpost | hacker_community | 9b4dc3cfdb8775a5ec4d | gayanku_darkweb | 2012-11-17T06:29:00+00:00 | a89820e45ca67bb2cd68a065e1c0907952fb0f87e21b5184b21e0a60 | Re: Mtgox
Hi bro thanks for the reply,thats the funny thing i have tried this option to submit a ticket and this option doesn't seem to send either its like the page just refresh's leaving my ticket info hanging,also same thing if i'm to sell coins,just doesn't register...my account logs in fine...its not froze,try'd ... | [Silk Road 1] Re: Mtgox
Hi bro thanks for the reply,thats the funny thing i have tried this option to submit a ticket and this option doesn't seem to send either its like the page just refresh's leaving my ticket info hanging,also same thing if i'm to sell coins,just doesn't register...my account logs in fine...its no... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T19:49:27.479647+00:00 | research_text_with_terms | research_text | null |
a193038fc6866fe5286970e6 | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 11ab2549abf10a4427fd | exploitdb_hf | 2000-01-01T00:00:00+00:00 | cc6c519df74be3db3fe300d902d97d0812bff32473c8a8d00b3502cb4311d1f1 | K-Links - Link Directory Script SQL Injection
This is a webapps exploit for php platform. Description: K-Links - Link Directory Script SQL Injection. Author: R3d-D3V!L | K-Links - Link Directory Script SQL Injection
This is a webapps exploit for php platform. Description: K-Links - Link Directory Script SQL Injection. Author: R3d-D3V!L | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:32.065058+00:00 | research_text_with_terms | research_text | null |
99ee9d7716e7dfcfbfb28d34 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 9666220dd724a487c431 | nvd_cve | 2011-10-18T22:55:03.650000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2011-3518: Unspecified vulnerability in the Siebel Core - UIF Client component in Oracle Siebel CRM 8.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to User Interface. | CVE-2011-3518: Unspecified vulnerability in the Siebel Core - UIF Client component in Oracle Siebel CRM 8.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to User Interface. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:29.492109+00:00 | redistributable_text | text | null |
29c84c9ea761da8ab0fba90e | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 9531f8cd6234208e6dcf | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 072609f23c82caafa6763772716296b037fba40e89931d49543236184088b277 | EDUMOD Pro 1.3 - SQL Injection
This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS | EDUMOD Pro 1.3 - SQL Injection
This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:25.043954+00:00 | research_text_with_terms | research_text | null |
8b31e1f4a20c28092560970f | hackerone_posts | data/hackerone_posts.jsonl | forumpost | bug_bounty_disclosure | 2db6edb6f1a3ddefc0de | hackerone | 2017-05-18T08:01:03.736000+00:00 | bae1ba4fdbb6a1ee40cb9743f1f694da2cd08694e43a0393e36f2dcfd976e3bc | nginx version disclosure on downloads.gratipay.com
Hello,
Navigating to <URL> goes to a 404 error page disclosing your Nginx version. Server information should be protected since anyone with a bad intent on would try to find exploit for the specified server version.
Thanks,
Footstep | [Information Disclosure] nginx version disclosure on downloads.gratipay.com
Hello,
Navigating to http://downloads.gratipay.com/Error goes to a 404 error page disclosing your Nginx version. Server information should be protected since anyone with a bad intent on would try to find exploit for the specified server versi... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:15.000465+00:00 | research_text_with_terms | research_text | null |
117a955dce078173e497911d | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | d24a0ff4c2e3daf1392d | nvd_cve | 2009-02-03T01:30:00.297000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2009-0392: Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter. | CVE-2009-0392: Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:26.976343+00:00 | redistributable_text | text | null |
7328e416d9d03999f361112c | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 30b3f8f23ac6ac9521a5 | exploit_db | 2006-08-30T00:00:00+00:00 | aa373c8920e1bf452bd79c64917f8ee184c137b7e973f7ecc039847e70e963c0 | osCommerce 2.1/2.2 - 'product_info.php' SQL Injection
source: <URL>
osCommerce is prone to an SQL-injection vulnerability because the application fails to sufficiently sanitize user-supplied data.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vuln... | osCommerce 2.1/2.2 - 'product_info.php' SQL Injection
source: https://www.securityfocus.com/bid/19774/info
osCommerce is prone to an SQL-injection vulnerability because the application fails to sufficiently sanitize user-supplied data.
A successful exploit may allow an attacker to compromise the application, access ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:53.650188+00:00 | redistributable_text | text | null |
8e5f0f479e9ceecf16c859a4 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 7dc259be82918a812d25 | nvd_cve | 2005-10-18T21:02:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2005-2969: The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use ... | CVE-2005-2969: The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use ... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:20.289327+00:00 | redistributable_text | text | null |
f03a1436e012f92e094bf2ef | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 54b155a69d1b9a801372 | nvd_cve | 2006-11-28T02:07:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2006-6136: IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) does not perform EAL4 authentication checks at the proper time during "registering of response operation," which has unknown impact and attack vectors. | CVE-2006-6136: IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) does not perform EAL4 authentication checks at the proper time during "registering of response operation," which has unknown impact and attack vectors. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:22.780359+00:00 | redistributable_text | text | null |
11ffcf4a5beec13b14784993 | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | fc1e712ba14d5c9098b8 | github_advisory | 2026-04-10T19:39:15+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | uv vulnerable to arbitrary file deletion through RECORD entries
## Impact
Wheel RECORD entries can contain relative paths that traverse outside of the wheel’s installation prefix. In versions 0.11.5 and earlier of uv, these wheels were not rejected on installation and the RECORD was respected without validation on... | uv vulnerable to arbitrary file deletion through RECORD entries
[Severity: LOW]
## Impact
Wheel RECORD entries can contain relative paths that traverse outside of the wheel’s installation prefix. In versions 0.11.5 and earlier of uv, these wheels were not rejected on installation and the RECORD was respected without... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:04.953025+00:00 | redistributable_text | text | null |
0081f965a0270d4aabec42cb | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 1c0aeaf90ba26c1afd7a | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 330b3dcff417c946924d7217ff3ba1b72abb0e1e15d3bfdff0be7d6484fadce6 | Analyze the security implications of: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation
This exploit targets irix systems. Type: local. Risk level: Medium | Analyze the security implications of: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation
This exploit targets irix systems. Type: local. Risk level: Medium | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:27.561008+00:00 | research_text_with_terms | research_text | null |
18f46488949e5ceac1753019 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 4df96e98e2b2e9df25ec | nvd_cve | 2007-02-01T22:28:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2007-0656: PHP remote file inclusion vulnerability in includes/functions.php in phpBB2-MODificat 0.2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | CVE-2007-0656: PHP remote file inclusion vulnerability in includes/functions.php in phpBB2-MODificat 0.2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:23.351207+00:00 | redistributable_text | text | null |
1973fb7ce614369ce0120e81 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | c01daecccb483f243c9a | exploit_db | 2011-12-26T00:00:00+00:00 | ae92cb48a43779cbbdc4a7b7913c6ee3e663a7af6ec3ad92815406273c138b71 | Nagios Plugins check_ups - Local Buffer Overflow (PoC)
#################################################################
# Advisory: Nagios Plugin 'check_ups' local buffer overflow
# Author: Stefan Schurtz
# Contact: s.schurtz@infoserve.de
# Affected Software: Successfully tested on nagios-plugins-1.4.15
# Vendor URL:... | Nagios Plugins check_ups - Local Buffer Overflow (PoC)
#################################################################
# Advisory: Nagios Plugin 'check_ups' local buffer overflow
# Author: Stefan Schurtz
# Contact: s.schurtz@infoserve.de
# Affected Software: Successfully tested on nagios-plugins-1.4.15
# Ven... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:44.835496+00:00 | redistributable_text | text | null |
9ddf63e66adef1a1e4c9b7bb | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | e360c26669e82ec39a26 | exploit_db | 2007-07-28T00:00:00+00:00 | 2587ced3fcf600dd91bae31dbe098ab8a30a0114813cfe953a9b655fd2b627b8 | Real Estate Listing Website Application Template Login Dialog - SQL Injection
source: <URL>
Real Estate Listing Website Application Template is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an a... | Real Estate Listing Website Application Template Login Dialog - SQL Injection
source: https://www.securityfocus.com/bid/25115/info
Real Estate Listing Website Application Template is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:42.257685+00:00 | redistributable_text | text | null |
48af22a1c6277f7d83248073 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 9a80bbe2b1b46fa46662 | nvd_cve | 2006-06-02T10:18:00+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2006-2769: The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration. | CVE-2006-2769: The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:21.628892+00:00 | redistributable_text | text | null |
ccfb346e4af96aaa4913cedb | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 28895d2c7e1bce4a31dd | nvd_cve | 2008-11-10T16:15:12.247000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2008-5035: The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length. | CVE-2008-5035: The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:26.686178+00:00 | redistributable_text | text | null |
68e8409a57d9384eda36b58d | hacker_exploits_posts | data/hacker_exploits_posts.jsonl | forumpost | hacker_community | 130e3b5326090f876af4 | persiantools | 2026-04-15T22:02:51.155211+00:00 | f0bf9f363d8389ee11dc59d8febfeb748e9b7a272edfadf678b4ff34111cec0a | نرم افزار :: Windows Mobile , Pocket Pc, Win CE ٠
یک برنامه برای فرستادن اس ام اس بصورت برنامه ریزی شده و در زمانهای از پیش تعیین شده. این برنامه قبلا روی تمام ویندوز موبایلها کار میکرد بجز 2006 که در این نسخه این مشکل هم حل شده. از خصوصیات این برنامه میشه به فرستادن تعداد نامحدود اس ام اس در زمانهای مختلف. فرستادن از... | نرم افزار :: Windows Mobile , Pocket Pc, Win CE ٠
یک برنامه برای فرستادن اس ام اس بصورت برنامه ریزی شده و در زمانهای از پیش تعیین شده. این برنامه قبلا روی تمام ویندوز موبایلها کار میکرد بجز 2006 که در این نسخه این مشکل هم حل شده. از خصوصیات این برنامه میشه به فرستادن تعداد نامحدود اس ام اس در زمانهای مختلف. فرستادن ا... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:04:40.388731+00:00 | research_text_with_terms | research_text | null |
c59ea3dcee722dda37f71f3f | github_advisory_posts | data/github_advisory_posts.jsonl | forumpost | advisory_reference | fe29428d12130a93f576 | github_advisory | 2026-03-11T00:37:44+00:00 | 2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc | Quill vulnerable to SSRF via unvalidated URL from Apple notarization log retrieval
### Impact
Quill before version <CODE> contains a Server-Side Request Forgery (SSRF) vulnerability when attempting to fetch the Apple notarization submission logs. Exploitation requires the ability to modify API responses from Apple... | Quill vulnerable to SSRF via unvalidated URL from Apple notarization log retrieval
[Severity: MEDIUM]
### Impact
Quill before version `v0.7.1` contains a Server-Side Request Forgery (SSRF) vulnerability when attempting to fetch the Apple notarization submission logs. Exploitation requires the ability to modify API r... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:06.495276+00:00 | redistributable_text | text | null |
683d5b112c987e53e97976a3 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | b7753f41757d37ce64ad | exploit_db | 2010-09-22T00:00:00+00:00 | ec71efe2999e73441ad5d0ec682630db2d178e4782c183750c4244f5bd4edb77 | Adobe Shockwave Director tSAC - Chunk Memory Corruption
'''
__ __ ____ _ _ ____
| \/ |/ __ \ /\ | | | | _ \
| \ / | | | | / \ | | | | |_) |
| |\/| | | | |/ /\ \| | | | _ <
| | | | |__| / ____ \ |__| | |_) |
|_| |_|\____/_/ \_\____/|____/
'''
'''
Title : Adobe Shockwave Director tSAC Chunk memory corruption
... | Adobe Shockwave Director tSAC - Chunk Memory Corruption
'''
__ __ ____ _ _ ____
| \/ |/ __ \ /\ | | | | _ \
| \ / | | | | / \ | | | | |_) |
| |\/| | | | |/ /\ \| | | | _ <
| | | | |__| / ____ \ |__| | |_) |
|_| |_|\____/_/ \_\____/|____/
'''
'''
Title : Adobe S... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:58.987902+00:00 | redistributable_text | text | null |
2eec8af1c0a81eb2471b0692 | exploitdb_posts | data/exploitdb_posts.jsonl | forumpost | exploit_archive | 921882caae2b2e8524ae | exploit_db | 2013-02-11T00:00:00+00:00 | 830e5d2336664045000f657ec007b7273f1ccc7053080616225b69fe5d078e83 | IP.Gallery 4.2.x/5.0.x - Persistent Cross-Site Scripting
# Exploit Title: IP.Gallery 4.2.x and 5.0.x persistent XSS vulnerability
# Date: 8/2/2013
# Exploit Author: Mohamed Ramadan
# Author HomePage: <URL>
# Author Twitter : <URL>
# Vendor Homepage: <URL>
# Software Link: <URL>
# Version: IP.Gallery 4.2.x a... | IP.Gallery 4.2.x/5.0.x - Persistent Cross-Site Scripting
# Exploit Title: IP.Gallery 4.2.x and 5.0.x persistent XSS vulnerability
# Date: 8/2/2013
# Exploit Author: Mohamed Ramadan
# Author HomePage: http://www.Attack-Secure.com
# Author Twitter : https://twitter.com/Attack_Secure
# Vendor Homepage: http://www.in... | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:51.321379+00:00 | redistributable_text | text | null |
fcf1e7dac43952f4a54964a2 | exploitdb_hf_posts | data/exploitdb_hf_posts.jsonl | forumpost | exploit_qa_reference | 145faf2e3eaeae4dda0c | exploitdb_hf | 2000-01-01T00:00:00+00:00 | 90edeb5a4e9fe2162b1c04340e2f86a52430570e412b4ecf29784fbe7cc27d43 | Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect. Author: Andrew Gill | Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect. Author: Andrew Gill | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:08:35.311391+00:00 | research_text_with_terms | research_text | null |
3cf636b1802c1df3dbd82a14 | nvd_posts | data/nvd_posts.jsonl | forumpost | vulnerability_reference | 574b085fba8077d0c537 | nvd_cve | 2009-01-06T17:30:00.467000+00:00 | e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea | CVE-2008-5855: myPHPscripts Login Session 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to discover usernames, e-mail addresses, and password hashes via a direct request for users.txt. | CVE-2008-5855: myPHPscripts Login Session 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to discover usernames, e-mail addresses, and password hashes via a direct request for users.txt. | null | null | null | null | null | null | null | null | null | null | null | null | null | [] | [] | 2026-04-26T20:09:26.875532+00:00 | redistributable_text | text | null |
HackerSignal
A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.
Overview
| Statistic | Value |
|---|---|
| Documents | 7,447,646 (exact-deduplicated) |
| Sources | 64 public forum/source identifiers |
| Source layers | 8 |
| Temporal span | 1988--2026 |
| CVE-linked rows | 360,004 |
| Benchmark tasks | 3 |
Quick Start
from datasets import load_dataset
# Load the 10K stratified sample (24 MB)
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")
# Load a benchmark task
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")
# Load the full corpus (12 GB)
full = load_dataset("DatasetSubmission/HackerSignal", "default")
Source Layers
| Layer | Description | Rows |
|---|---|---|
hacker_community |
Forum posts from hacker/security communities | 6,974,128 |
exploit_archive |
Published exploit code and advisories | 197,393 |
vulnerability_reference |
NVD CVE descriptions and structured advisories | 150,916 |
exploit_qa_reference |
Security Q&A and tutorial content | 68,791 |
advisory_reference |
Vendor and third-party security advisories | 30,361 |
bug_bounty_disclosure |
Public bug bounty reports | 13,720 |
fix_commit_reference |
Vulnerability fix commit messages | 11,104 |
exploitation_reference |
Active exploitation indicators (CISA KEV) | 1,233 |
Benchmark Tasks
Task 1: CVE Linkage Retrieval (CVE-R)
Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Queries come from 22 source identifiers across exploit archives, advisories, fix commits, and bug bounty reports; filtered to ≥8 tokens.
| Split | Rows |
|---|---|
| Train | 56,692 |
| Val | 2,584 |
| Test | 1,990 |
| Corpus | 340,536 |
Task 2: Exploit Type Classification (ETC)
8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.
| Split | Rows |
|---|---|
| Train | 64,413 |
| Val | 4,735 |
| Test | 1,735 |
Task 3: Temporal Generalization (TG)
Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.
| Split | Rows |
|---|---|
| Train | 56,833 |
| Val | 2,535 |
| Test | 1,898 |
| Corpus | 340,536 |
Schema
Each record in the main corpus contains:
| Field | Type | Description |
|---|---|---|
unified_id |
string | SHA-256-derived release identifier |
source_dataset |
string | Input source file or dataset name |
source_layer |
string | Normalized layer (see above) |
text |
string | UTF-8 post/advisory text (max 8000 chars) |
timestamp |
string | ISO 8601 publication datetime (UTC) |
forum_id |
string | Source identifier |
author_hash |
string | SHA-256 pseudonymized author |
release_mode |
string | Governance mode (see below) |
Release Governance
Records follow source-specific release modes:
redistributable_text(5 sources): Full text included under public-domain or CC licenses.research_text_with_terms(9 sources): Text included with source attribution; no commercial reuse.metadata_or_pointer_only(13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.
See docs/release_governance.md for the full source matrix, takedown policy, and responsible-use restrictions.
Responsible Use
This dataset is intended for defensive cybersecurity research only. Prohibited uses include:
- Training systems for automated exploit code generation or malware
- De-anonymizing forum participants outside approved research protocols
- Operational blocking or law-enforcement decisions based solely on model outputs
- Republishing text from
metadata_or_pointer_onlysources
Known Issues
- HuggingFace dataset viewer row count: The viewer may display a partial count (~1M) for the
default/fullsplit because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest. - Content-scanner warnings: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.
Limitations
- English-language bias; non-English communities may be underrepresented
- Historical forum imports skew toward 2015--2017
- Task labels are weak (CVE-linkage-derived), not human-annotated
- ~8% near-duplicate content remains after exact deduplication
- 1.57M rows under 8 tokens (useful for interaction analysis, not classification)
Citation
@misc{hackersignal2026,
title={{HackerSignal}: A Temporally Structured, Multi-Source Benchmark for Cybersecurity Threat Intelligence},
author={Anonymous},
year={2026},
howpublished={arXiv preprint}
}
License
Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.
- Downloads last month
- 51