Dataset Preview
Duplicate

The dataset viewer should be available soon. Please retry later.

unified_id
string
source_dataset
string
source_file
string
source_format
string
source_layer
string
source_record_id
string
forum_id
string
timestamp
string
author_hash
string
text
string
text_raw
string
text_length
int64
text_raw_length
int64
text_sha256
string
text_raw_sha256
string
thread_url
string
thread_title
string
section
string
post_index
int64
post_id
string
thread_id
string
scraped_at
string
reply_count
int64
view_count
int64
tags
list
cve_refs
list
dataset_generated_at
string
release_mode
string
released_artifact
string
redaction_reason
string
9ef2ea06af5776baf8910574
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
d14d6d8bc2d9dbb4de19
nvd_cve
2009-02-26T16:17:20.170000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2009-0623: Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet.
CVE-2009-0623: Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:27.113957+00:00
redistributable_text
text
null
ed367e6d7780add0630fd46a
gayanku_posts
data/gayanku_posts.jsonl
forumpost
hacker_community
cc9acf1ba48038957a68
gayanku_darkweb
2014-01-31T13:17:26+00:00
9c667327c431ac169abce3f8301d23c5141fece25da34187c32a6337
[Evolution] UK Carders Hey guys,Are there any specific forums for UK Carders?  Im not really into the carding scene more into bank drops and transferring funds.I cant seem to find any legit login sellers at the moment, and dont want to spend $50 at TCF to find out that they dont have any there either.Anyone from the ...
[Evolution] UK Carders Hey guys,Are there any specific forums for UK Carders?  Im not really into the carding scene more into bank drops and transferring funds.I cant seem to find any legit login sellers at the moment, and dont want to spend $50 at TCF to find out that they dont have any there either.Anyone from the ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:47:15.313407+00:00
research_text_with_terms
research_text
null
cd4501079c348232e3af902a
gayanku_posts
data/gayanku_posts.jsonl
forumpost
hacker_community
c99cc38db89326e20256
gayanku_darkweb
2012-03-11T05:40:00+00:00
d14254d6d34ea106afd5a5dd7c6b37ab37fd12804ad99348dea6ce38
Re: SilkRoad Stock: The New NYSE *ahem SRSE* Quote from: SouthSquareBiz on March 11, 2012, 03:55 amQuote from: anarcho47 on March 08, 2012, 10:39 pmQuote from: Nikodym on March 05, 2012, 05:56 amAccording to financial theory, any security is worth it for the right price, what kind of div yield we talkin? I can see the...
[Silk Road 1] Re: SilkRoad Stock: The New NYSE *ahem SRSE* Quote from: SouthSquareBiz on March 11, 2012, 03:55 amQuote from: anarcho47 on March 08, 2012, 10:39 pmQuote from: Nikodym on March 05, 2012, 05:56 amAccording to financial theory, any security is worth it for the right price, what kind of div yield we talkin?...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:49:24.279745+00:00
research_text_with_terms
research_text
null
14fb189913dd3b506838cfa5
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
527edcade76bcd709545
exploit_db
2010-11-02T00:00:00+00:00
dfac0d6e4c35a8aa16e26262130b1e352f68644f12994d3571befa5f923cae5e
BroadWorks - Call Detail Record Security Bypass source: <URL> BroadWorks is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and to obtain sensitive information. Successful exploits will enable the attacker to monitor the incoming and outgoing call...
BroadWorks - Call Detail Record Security Bypass source: https://www.securityfocus.com/bid/44597/info BroadWorks is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and to obtain sensitive information. Successful exploits will enable the attacker to ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:46.876131+00:00
redistributable_text
text
null
e29e946a901cab9b17ab49f8
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
23f3e8cfb259caf46b84
nvd_cve
2008-11-10T15:23:29.517000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2008-5026: Microsoft SharePoint uses URLs with the same hostname and port number for a web site's primary files and individual users' uploaded files (aka attachments), which allows remote authenticated users to leverage same-origin relationships and conduct cross-site scripting (XSS) attacks by uploading HTML docum...
CVE-2008-5026: Microsoft SharePoint uses URLs with the same hostname and port number for a web site's primary files and individual users' uploaded files (aka attachments), which allows remote authenticated users to leverage same-origin relationships and conduct cross-site scripting (XSS) attacks by uploading HTML docum...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:26.683878+00:00
redistributable_text
text
null
12abea91a5b9afcb340249bd
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
b2fb68c679b9970a162c
exploitdb_hf
2000-01-01T00:00:00+00:00
fc844ec3be80f9a4696afc31015fdf6b2ef31d8720c395b341f9c64cfa2b365e
CMS Made Simple 1.2 - Remote Code Execution This is a webapps exploit for php platform. Description: CMS Made Simple 1.2 - Remote Code Execution. Author: irk4z
CMS Made Simple 1.2 - Remote Code Execution This is a webapps exploit for php platform. Description: CMS Made Simple 1.2 - Remote Code Execution. Author: irk4z
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:24.225691+00:00
research_text_with_terms
research_text
null
5cbec18060cd85d4367f0e0b
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
09b93629068d49e7e203
github_advisory
2024-01-09T18:25:47+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability ### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone leveraging the <CODE> protocol or the <CODE> is vulnerable. Microsoft.IdentityModel trusts the <CODE> claim by default for the <CODE> protocol. This raises t...
Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability [Severity: HIGH] ### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:09.667814+00:00
redistributable_text
text
null
8f7e21f7f162b114b3205bc0
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
058bc41521de80572fe0
github_advisory
2021-10-04T20:12:30+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper clas...
Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils [Severity: CRITICAL] Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The Binar...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:12.704107+00:00
redistributable_text
text
null
91f1b9a9a7619cd9bbe5691d
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
e974954b02191663fb21
nvd_cve
2008-08-27T15:21:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2008-3745: The Upload module in Drupal 6.x before 6.4 allows remote authenticated users to edit nodes, delete files, and download unauthorized attachments via unspecified vectors.
CVE-2008-3745: The Upload module in Drupal 6.x before 6.4 allows remote authenticated users to edit nodes, delete files, and download unauthorized attachments via unspecified vectors.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:26.400485+00:00
redistributable_text
text
null
466c62d9a808516e3abaafa6
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
36f6065b17f8647ffffb
nvd_cve
2007-03-30T01:19:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2007-1776: SQL injection vulnerability in index.php in the DesignForJoomla.com D4J eZine (com_ezine) 2.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the article parameter in a read action.
CVE-2007-1776: SQL injection vulnerability in index.php in the DesignForJoomla.com D4J eZine (com_ezine) 2.8 and earlier component for Joomla! allows remote attackers to execute arbitrary SQL commands via the article parameter in a read action.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:23.754046+00:00
redistributable_text
text
null
a6bc2e343e2d8e126eee8efe
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
e93e3bea24e93a771185
github_advisory
2026-01-13T20:37:09+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State ### Summary **Description** A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may lead to logic b...
Mass Assignment in AdonisJS Lucid Allows Overwriting Internal ORM State [Severity: HIGH] ### Summary **Description** A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This may ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:06.986613+00:00
redistributable_text
text
null
b3e89967574d961065da6125
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
8be4cca4d1771f22ab72
exploit_db
2021-09-21T00:00:00+00:00
bc8b1864e0165812387f60c638f5d797a8ea475e2623556b034f8686b462100b
WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated) # Exploit Title: WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated) # Date: 18-09-2021 # Exploit Author: Halit AKAYDIN (hLtAkydn) # Vendor Homepage: <URL> # Software Link: <URL> # Version: 2.13.0 # Category: Webapps # Tested on: Linux/W...
WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated) # Exploit Title: WebsiteBaker 2.13.0 - Remote Code Execution (RCE) (Authenticated) # Date: 18-09-2021 # Exploit Author: Halit AKAYDIN (hLtAkydn) # Vendor Homepage: https://websitebaker.org/ # Software Link: http://wiki.websitebaker.org/doku.php/en/downl...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:56.940857+00:00
redistributable_text
text
null
15306ca798e9cb3837fdb3ce
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
cf83af40dd1f4ef07659
nvd_cve
2025-05-08T07:15:54.437000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2025-37832: Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-37832: Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:10:16.779546+00:00
redistributable_text
text
null
7b33e787a6f90b3cdd1260aa
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
2a95f98bb6f32ed5966d
exploitdb_hf
2000-01-01T00:00:00+00:00
d1f3b69c14a7c9b6e12f455825a5d7e28dfce2a5063a072936574e8e42c26f98
Samba 3.5.11/3.6.3 - Remote Code Execution This is a remote exploit for linux platform. Description: Samba 3.5.11/3.6.3 - Remote Code Execution. Author: kb
Samba 3.5.11/3.6.3 - Remote Code Execution This is a remote exploit for linux platform. Description: Samba 3.5.11/3.6.3 - Remote Code Execution. Author: kb
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:39.195347+00:00
research_text_with_terms
research_text
null
41834afcb7eddb878647a587
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
cc831b0738d381ae0bd7
exploit_db
2017-05-03T00:00:00+00:00
0f288d6077b50f4a67494bc8a2414323af7bfaf56b26967afa66bc1e2c9f1e78
WordPress Core < 4.7.4 - Unauthorized Password Reset ============================================= - Discovered by: Dawid Golunski - dawid[at]legalhackers.com - <URL> - CVE-2017-8295 - Release date: 03.05.2017 - Revision 1.0 - Severity: Medium/High ============================================= Source: <URL> If an...
WordPress Core < 4.7.4 - Unauthorized Password Reset ============================================= - Discovered by: Dawid Golunski - dawid[at]legalhackers.com - https://legalhackers.com - CVE-2017-8295 - Release date: 03.05.2017 - Revision 1.0 - Severity: Medium/High ============================================= Sou...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:46.145947+00:00
redistributable_text
text
null
a9f37aeee55acc6d7de88d1b
kaeli_hacker_posts
data/kaeli_hacker_posts.jsonl
forumpost
hacker_community
7918a063ae705583753f
antionline
2006-05-10T13:47:00+00:00
5f9edd892da192bbbe4a9f258b5f86c8e4c0e2d8b573866273518afd1eba7101
cain&able help well, my specs are more than enough for the program, but I was running xp and I think I got the 98 version. I downloaded the xp version and it works just fine. Problem solved None
cain&able help well, my specs are more than enough for the program, but I was running xp and I think I got the 98 version. I downloaded the xp version and it works just fine. Problem solved None
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:06:48.628844+00:00
research_text_with_terms
research_text
null
5c460049f5ef2d46ea55c53a
hacker_exploits_posts
data/hacker_exploits_posts.jsonl
forumpost
hacker_community
e8538c299d4b54a36cc2
antichat
2009-01-21T00:00:00+00:00
3a1845822b3d9ed5179157015e037a997bb4ac7e8461b565fe9e5bb3b28d22da
Jimm научится читать и перестать тупить
Jimm научится читать и перестать тупить
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:58:38.293175+00:00
research_text_with_terms
research_text
null
c20dfac4f86f9813f8198d4a
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
2241bd4c1f98b6acf5c4
exploitdb_hf
2000-01-01T00:00:00+00:00
615557f2492feea1062d96708632d20e15edd925082d04f2a25bb2cde3cc7de2
Flatpress 0.804 < 0.812.1 - Local File Inclusion This is a webapps exploit for php platform. Description: Flatpress 0.804 < 0.812.1 - Local File Inclusion. Author: Giuseppe Fuggiano
Flatpress 0.804 < 0.812.1 - Local File Inclusion This is a webapps exploit for php platform. Description: Flatpress 0.804 < 0.812.1 - Local File Inclusion. Author: Giuseppe Fuggiano
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:27.550757+00:00
research_text_with_terms
research_text
null
81f087fb0e6fada1a332884b
gayanku_posts
data/gayanku_posts.jsonl
forumpost
hacker_community
3028120d5416786bdd8e
gayanku_darkweb
2013-10-10T00:00:00+00:00
6961cff603e7e889e890ea01bdc9cfcf583cea82a13ba69a7ac97bed
NEVER click on LINKS on the FORUM or SHOP to CLEARNET sites! Maxenergy, those are not reasons to not browse the clearnet. The fbi could set up a hidden service the same way to take down an exit node. But that is all they will get, an exit node. And new tor browsers are not susceptible to java-script exploits. also the...
[Black Market Reloaded] NEVER click on LINKS on the FORUM or SHOP to CLEARNET sites! Maxenergy, those are not reasons to not browse the clearnet. The fbi could set up a hidden service the same way to take down an exit node. But that is all they will get, an exit node. And new tor browsers are not susceptible to java-s...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:47:11.995359+00:00
research_text_with_terms
research_text
null
bb95dab7ec2d9409f158aeee
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
8261f72daa225260250b
nvd_cve
2009-12-10T22:30:00.657000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2009-4181: Stack-based buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via vectors involving the sel and arg parameters to jovgraph.exe.
CVE-2009-4181: Stack-based buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via vectors involving the sel and arg parameters to jovgraph.exe.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:28.001916+00:00
redistributable_text
text
null
e95044a4e99b02663a1d7159
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
21d8237c8b7bb468b89e
exploitdb_hf
2000-01-01T00:00:00+00:00
1d80fb9f8e31857e7ecf8a9c99a9fe3ff518d54e41fa4ed8cf2ac780a22d8884
Joomla! Component File Download Tracker 3.0 - SQL Injection This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan
Joomla! Component File Download Tracker 3.0 - SQL Injection This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:41.423757+00:00
research_text_with_terms
research_text
null
c52b7a9b429677a1050a38ba
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
52d5cb795b28ace3175b
nvd_cve
2006-04-20T18:06:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2006-1929: PHP remote file inclusion vulnerability in include/common.php in I-Rater Platinum allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter.
CVE-2006-1929: PHP remote file inclusion vulnerability in include/common.php in I-Rater Platinum allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:21.295425+00:00
redistributable_text
text
null
e04eeac348c69c1678ffbfe1
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
04a002d8eda00bb2d0cc
exploitdb_hf
2000-01-01T00:00:00+00:00
330b3dcff417c946924d7217ff3ba1b72abb0e1e15d3bfdff0be7d6484fadce6
Analyze the security implications of: ACollab - Multiple Vulnerabilities This exploit targets php systems. Type: webapps. Risk level: Medium
Analyze the security implications of: ACollab - Multiple Vulnerabilities This exploit targets php systems. Type: webapps. Risk level: Medium
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:35.094000+00:00
research_text_with_terms
research_text
null
2f012e055e2de84dca0f2e86
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
6a0abe9574d28c0dad3c
exploit_db
2018-07-02T00:00:00+00:00
5d167dd5fa6549333f5022adba42b0503de13c3873bd44bb12ba86a4c274e45d
VMware NSX SD-WAN Edge < 3.1.2 - Command Injection #!/usr/bin/env python # Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud # Date: 2018-06-29 # Exploit Author: paragonsec @ Critical Start # Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start # Vendor Home...
VMware NSX SD-WAN Edge < 3.1.2 - Command Injection #!/usr/bin/env python # Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud # Date: 2018-06-29 # Exploit Author: paragonsec @ Critical Start # Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start # Vendor Home...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:44.106279+00:00
redistributable_text
text
null
7e6325f4cbe0d66f57935bf9
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
631501cedcce00a92b3c
exploit_db
2000-08-15T00:00:00+00:00
fb19abfc56211aef5e8156019b8b2797883eb9de01cef8e55570a304b1968711
David Bagley xlock 4.16 - User Supplied Format String (1) // source: <URL> A vulnerability exists in versions of the xlockmore program, originally written by David Bagley. It is believed to affect all versions of xlock derived from xlockmore. This includes the xlock shipped with a number of popular operating systems...
David Bagley xlock 4.16 - User Supplied Format String (1) // source: https://www.securityfocus.com/bid/1585/info A vulnerability exists in versions of the xlockmore program, originally written by David Bagley. It is believed to affect all versions of xlock derived from xlockmore. This includes the xlock shipped with ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:58.718838+00:00
redistributable_text
text
null
daaa0520386494e81044c0f0
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
8616e9c841196979aa0a
github_advisory
2024-04-05T15:39:19+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
whoami stack buffer overflow on several Unix platforms With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris: - <CODE> - <CODE> - <CODE> - <CODE> With versions of the whoami crate >= 0.5.3 and < 1.0.1, calling ...
whoami stack buffer overflow on several Unix platforms [Severity: HIGH] With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris: - `whoami::username` - `whoami::realname` - `whoami::username_os` - `whoami::realname_os` ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:09.400762+00:00
redistributable_text
text
null
db8fa549898465fda5d1046f
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
c0fe9bd26f183efcd109
nvd_cve
2003-05-05T04:00:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2003-0196: Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
CVE-2003-0196: Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:18.307607+00:00
redistributable_text
text
null
1c42a04a2054b0c0c8748eba
hacker_exploits_posts
data/hacker_exploits_posts.jsonl
forumpost
hacker_community
92bffeb7952eb0c8ff78
antichat
2007-07-25T00:00:00+00:00
87cefcef9cc1a505be68ed528a2e4bca71c0288e40f4471b8e6da91b837d58c0
Пишем php-мейлер Ты прав достойного скрипта для анонимной отправки нету, еси есть глючные какие то. А твой скрипт неплохой)). Просто с мейл ру у меня проблемы. Наверно из за хоста, так как на рамблер отправился.)))))Если кто нить знает адресс с поддержкой пхп и смтп то пожалуйста дайте мне знать.Еще я никогда не работ...
Пишем php-мейлер Ты прав достойного скрипта для анонимной отправки нету, еси есть глючные какие то. А твой скрипт неплохой)). Просто с мейл ру у меня проблемы. Наверно из за хоста, так как на рамблер отправился.)))))Если кто нить знает адресс с поддержкой пхп и смтп то пожалуйста дайте мне знать.Еще я никогда не работ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:52:56.576513+00:00
research_text_with_terms
research_text
null
931a3050ec229bddc832af21
hacker_exploits_posts
data/hacker_exploits_posts.jsonl
forumpost
hacker_community
f9da8e5980a8ed353c7b
antichat
2026-04-15T22:00:55.398153+00:00
db98f0b5ad634abeb0d13b38f49d795b99e6ea0f934a131f1d5da59b78eadbfd
Подскажите, что произошло и что это может быть за ссылка? altblitz said:↑Тренировка футбольной команды школы в спорт.-зале Олимпийского Резерва.И чем же они там, в душе после тренировки, нагие Апполоны заняты друг с другом?Света в душе не было, для подростков. Тут и понесло.. <URL> to expand...да боже вас упаси, зачем...
Подскажите, что произошло и что это может быть за ссылка? altblitz said:↑Тренировка футбольной команды школы в спорт.-зале Олимпийского Резерва.И чем же они там, в душе после тренировки, нагие Апполоны заняты друг с другом?Света в душе не было, для подростков. Тут и понесло..https://limona.xyz/ras/incest/3980.htmlClic...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:56:53.759803+00:00
research_text_with_terms
research_text
null
65ff39521819dbeb964add9b
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
a92607190b5d16184ace
nvd_cve
2005-11-16T07:42:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2005-3544: Cross-site scripting (XSS) vulnerability in u2u.php in XMB 1.9.3 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
CVE-2005-3544: Cross-site scripting (XSS) vulnerability in u2u.php in XMB 1.9.3 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:20.363151+00:00
redistributable_text
text
null
93ba1207780beb2601e3b6fa
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
71921dc8e22ef4dea45f
exploitdb_hf
2000-01-01T00:00:00+00:00
4efd15040764f7e5eda7baee26078bc728f2fb523b906974160f0d7b3d3da9aa
FloosieTek FTGate 2.1 - Web File Access This is a remote exploit for multiple platform. Description: FloosieTek FTGate 2.1 - Web File Access. Author: Marc
FloosieTek FTGate 2.1 - Web File Access This is a remote exploit for multiple platform. Description: FloosieTek FTGate 2.1 - Web File Access. Author: Marc
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:32.272589+00:00
research_text_with_terms
research_text
null
620512921c92e6cdc85f578a
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
c942492b65582f9e7fee
exploitdb_hf
2000-01-01T00:00:00+00:00
d6e41ac339f2771b27b05350f485a5111e4e9799700b0ec8513a9853b606a5f1
Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting This is a remote exploit for linux platform. Description: Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting. Author: Adam Muntner
Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting This is a remote exploit for linux platform. Description: Apache Tomcat 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting. Author: Adam Muntner
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:40.583645+00:00
research_text_with_terms
research_text
null
18ca9b8c38a0904bafa0934b
cvefixes_posts
data/cvefixes_posts.jsonl
forumpost
fix_commit_reference
64f74cf0dd894508efaf
cvefixes
2022-02-28T10:15:00+00:00
f3c3a2e92cd3f9da2215e1d34de274f962bef059e06edb9ceb54261ff686acdd
CVE: CVE-2022-0768 [{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository rudloff/alltube prior to 3.0.2.'}] Fix commit: Merge branch 'hotfix/3.0.2'
CVE: CVE-2022-0768 [{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository rudloff/alltube prior to 3.0.2.'}] Fix commit: Merge branch 'hotfix/3.0.2'
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:23.654359+00:00
redistributable_text
text
null
bb27e227f65569c77b1ead40
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
73430f89afcd3841ca33
exploit_db
2016-06-15T00:00:00+00:00
76c9255109c644e3818401a42ba17817fbaa6e89703ec032e1ecc8763a42ecd6
Hyperoptic (Tilgin) Router HG23xx - Multiple Vulnerabilities Hyperoptic (Tilgin) Router HG23xx Multiple XSS And CSRF Vulnerabilities Vendor: Hyperoptic Ltd. | Tilgin AB Product web page: <URL> <URL> Affected version: HG2330, HG2302 and HG2301 Summary: Tilgin's HG23xx family of products offers a flexible and high ...
Hyperoptic (Tilgin) Router HG23xx - Multiple Vulnerabilities Hyperoptic (Tilgin) Router HG23xx Multiple XSS And CSRF Vulnerabilities Vendor: Hyperoptic Ltd. | Tilgin AB Product web page: http://www.hyperoptic.com http://www.tilgin.com Affected version: HG2330, HG2302 and HG2301 Summary: Tilgin's H...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:43.865419+00:00
redistributable_text
text
null
b32cb2efb175e4fad7c0ca4b
hacker_exploits_posts
data/hacker_exploits_posts.jsonl
forumpost
hacker_community
83cc6ae8fd32ad1ff1af
altenens
2020-03-17T00:00:00+00:00
9c9fc0853a8564c7e78d0d15811435be18bd7fa1c5109919412af7e7b9c16ace
x200 POF.COM Dating Site Account with capture thanks –•™Nostalgia™•– said: [Hidden content] Click to expand...
x200 POF.COM Dating Site Account with capture thanks –•™Nostalgia™•– said: [Hidden content] Click to expand...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:02:56.727713+00:00
research_text_with_terms
research_text
null
99a720a39b0677ca890b630e
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
24315e30e7eadedf01ba
nvd_cve
2006-05-01T19:06:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2006-2114: Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request.
CVE-2006-2114: Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:21.355292+00:00
redistributable_text
text
null
902d7c0f0ea07bc28e97be9c
evolution_posts
data/evolution_posts.jsonl
forumpost
hacker_community
aeeb3abd5e4be9c1a1f6
evolution_darkweb
2015-01-14T13:20:50+00:00
3c4e6d6cd7a659a75c6d3e80654b2bd7ef9a62a99fe7e9340232da56299745a0
me too please:)
me too please:)
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:46:20.824690+00:00
research_text_with_terms
research_text
null
7539e4810d09b5d7ff171a17
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
1a4de17c77ee1e6dc5f2
exploit_db
2016-05-31T00:00:00+00:00
76c9255109c644e3818401a42ba17817fbaa6e89703ec032e1ecc8763a42ecd6
Flatpress 1.0.3 - Cross-Site Request Forgery / Arbitrary File Upload  <!-- FlatPress 1.0.3 CSRF Arbitrary File Upload Vendor: Edoardo Vacchi Product web page: <URL> Affected version: 1.0.3 Summary: FlatPress is a blogging engine that saves your posts as simple text files. Forget about SQL! You just need some PHP...
Flatpress 1.0.3 - Cross-Site Request Forgery / Arbitrary File Upload <!DOCTYPE html> <!-- FlatPress 1.0.3 CSRF Arbitrary File Upload Vendor: Edoardo Vacchi Product web page: http://www.flatpress.org Affected version: 1.0.3 Summary: FlatPress is a blogging engine that saves your posts as simple text files. Forget...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:50.386475+00:00
redistributable_text
text
null
365634c98868105d252088ee
gayanku_posts
data/gayanku_posts.jsonl
forumpost
hacker_community
9b4dc3cfdb8775a5ec4d
gayanku_darkweb
2012-11-17T06:29:00+00:00
a89820e45ca67bb2cd68a065e1c0907952fb0f87e21b5184b21e0a60
Re: Mtgox Hi bro thanks for the reply,thats the funny thing i have tried this option to submit a ticket and this option doesn't seem to send either its like the page just refresh's leaving my ticket info hanging,also same thing if i'm to sell coins,just doesn't register...my account logs in fine...its not froze,try'd ...
[Silk Road 1] Re: Mtgox Hi bro thanks for the reply,thats the funny thing i have tried this option to submit a ticket and this option doesn't seem to send either its like the page just refresh's leaving my ticket info hanging,also same thing if i'm to sell coins,just doesn't register...my account logs in fine...its no...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T19:49:27.479647+00:00
research_text_with_terms
research_text
null
a193038fc6866fe5286970e6
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
11ab2549abf10a4427fd
exploitdb_hf
2000-01-01T00:00:00+00:00
cc6c519df74be3db3fe300d902d97d0812bff32473c8a8d00b3502cb4311d1f1
K-Links - Link Directory Script SQL Injection This is a webapps exploit for php platform. Description: K-Links - Link Directory Script SQL Injection. Author: R3d-D3V!L
K-Links - Link Directory Script SQL Injection This is a webapps exploit for php platform. Description: K-Links - Link Directory Script SQL Injection. Author: R3d-D3V!L
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:32.065058+00:00
research_text_with_terms
research_text
null
99ee9d7716e7dfcfbfb28d34
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
9666220dd724a487c431
nvd_cve
2011-10-18T22:55:03.650000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2011-3518: Unspecified vulnerability in the Siebel Core - UIF Client component in Oracle Siebel CRM 8.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to User Interface.
CVE-2011-3518: Unspecified vulnerability in the Siebel Core - UIF Client component in Oracle Siebel CRM 8.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to User Interface.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:29.492109+00:00
redistributable_text
text
null
29c84c9ea761da8ab0fba90e
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
9531f8cd6234208e6dcf
exploitdb_hf
2000-01-01T00:00:00+00:00
072609f23c82caafa6763772716296b037fba40e89931d49543236184088b277
EDUMOD Pro 1.3 - SQL Injection This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS
EDUMOD Pro 1.3 - SQL Injection This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:25.043954+00:00
research_text_with_terms
research_text
null
8b31e1f4a20c28092560970f
hackerone_posts
data/hackerone_posts.jsonl
forumpost
bug_bounty_disclosure
2db6edb6f1a3ddefc0de
hackerone
2017-05-18T08:01:03.736000+00:00
bae1ba4fdbb6a1ee40cb9743f1f694da2cd08694e43a0393e36f2dcfd976e3bc
nginx version disclosure on downloads.gratipay.com Hello, Navigating to <URL> goes to a 404 error page disclosing your Nginx version. Server information should be protected since anyone with a bad intent on would try to find exploit for the specified server version. Thanks, Footstep
[Information Disclosure] nginx version disclosure on downloads.gratipay.com Hello, Navigating to http://downloads.gratipay.com/Error goes to a 404 error page disclosing your Nginx version. Server information should be protected since anyone with a bad intent on would try to find exploit for the specified server versi...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:15.000465+00:00
research_text_with_terms
research_text
null
117a955dce078173e497911d
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
d24a0ff4c2e3daf1392d
nvd_cve
2009-02-03T01:30:00.297000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2009-0392: Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter.
CVE-2009-0392: Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:26.976343+00:00
redistributable_text
text
null
7328e416d9d03999f361112c
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
30b3f8f23ac6ac9521a5
exploit_db
2006-08-30T00:00:00+00:00
aa373c8920e1bf452bd79c64917f8ee184c137b7e973f7ecc039847e70e963c0
osCommerce 2.1/2.2 - 'product_info.php' SQL Injection source: <URL> osCommerce is prone to an SQL-injection vulnerability because the application fails to sufficiently sanitize user-supplied data. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vuln...
osCommerce 2.1/2.2 - 'product_info.php' SQL Injection source: https://www.securityfocus.com/bid/19774/info osCommerce is prone to an SQL-injection vulnerability because the application fails to sufficiently sanitize user-supplied data. A successful exploit may allow an attacker to compromise the application, access ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:53.650188+00:00
redistributable_text
text
null
8e5f0f479e9ceecf16c859a4
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
7dc259be82918a812d25
nvd_cve
2005-10-18T21:02:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2005-2969: The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use ...
CVE-2005-2969: The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:20.289327+00:00
redistributable_text
text
null
f03a1436e012f92e094bf2ef
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
54b155a69d1b9a801372
nvd_cve
2006-11-28T02:07:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2006-6136: IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) does not perform EAL4 authentication checks at the proper time during "registering of response operation," which has unknown impact and attack vectors.
CVE-2006-6136: IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) does not perform EAL4 authentication checks at the proper time during "registering of response operation," which has unknown impact and attack vectors.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:22.780359+00:00
redistributable_text
text
null
11ffcf4a5beec13b14784993
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
fc1e712ba14d5c9098b8
github_advisory
2026-04-10T19:39:15+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
uv vulnerable to arbitrary file deletion through RECORD entries ## Impact Wheel RECORD entries can contain relative paths that traverse outside of the wheel’s installation prefix. In versions 0.11.5 and earlier of uv, these wheels were not rejected on installation and the RECORD was respected without validation on...
uv vulnerable to arbitrary file deletion through RECORD entries [Severity: LOW] ## Impact Wheel RECORD entries can contain relative paths that traverse outside of the wheel’s installation prefix. In versions 0.11.5 and earlier of uv, these wheels were not rejected on installation and the RECORD was respected without...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:04.953025+00:00
redistributable_text
text
null
0081f965a0270d4aabec42cb
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
1c0aeaf90ba26c1afd7a
exploitdb_hf
2000-01-01T00:00:00+00:00
330b3dcff417c946924d7217ff3ba1b72abb0e1e15d3bfdff0be7d6484fadce6
Analyze the security implications of: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation This exploit targets irix systems. Type: local. Risk level: Medium
Analyze the security implications of: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation This exploit targets irix systems. Type: local. Risk level: Medium
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:27.561008+00:00
research_text_with_terms
research_text
null
18f46488949e5ceac1753019
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
4df96e98e2b2e9df25ec
nvd_cve
2007-02-01T22:28:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2007-0656: PHP remote file inclusion vulnerability in includes/functions.php in phpBB2-MODificat 0.2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
CVE-2007-0656: PHP remote file inclusion vulnerability in includes/functions.php in phpBB2-MODificat 0.2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:23.351207+00:00
redistributable_text
text
null
1973fb7ce614369ce0120e81
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
c01daecccb483f243c9a
exploit_db
2011-12-26T00:00:00+00:00
ae92cb48a43779cbbdc4a7b7913c6ee3e663a7af6ec3ad92815406273c138b71
Nagios Plugins check_ups - Local Buffer Overflow (PoC) ################################################################# # Advisory: Nagios Plugin 'check_ups' local buffer overflow # Author: Stefan Schurtz # Contact: s.schurtz@infoserve.de # Affected Software: Successfully tested on nagios-plugins-1.4.15 # Vendor URL:...
Nagios Plugins check_ups - Local Buffer Overflow (PoC) ################################################################# # Advisory: Nagios Plugin 'check_ups' local buffer overflow # Author: Stefan Schurtz # Contact: s.schurtz@infoserve.de # Affected Software: Successfully tested on nagios-plugins-1.4.15 # Ven...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:44.835496+00:00
redistributable_text
text
null
9ddf63e66adef1a1e4c9b7bb
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
e360c26669e82ec39a26
exploit_db
2007-07-28T00:00:00+00:00
2587ced3fcf600dd91bae31dbe098ab8a30a0114813cfe953a9b655fd2b627b8
Real Estate Listing Website Application Template Login Dialog - SQL Injection source: <URL> Real Estate Listing Website Application Template is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an a...
Real Estate Listing Website Application Template Login Dialog - SQL Injection source: https://www.securityfocus.com/bid/25115/info Real Estate Listing Website Application Template is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. ...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:42.257685+00:00
redistributable_text
text
null
48af22a1c6277f7d83248073
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
9a80bbe2b1b46fa46662
nvd_cve
2006-06-02T10:18:00+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2006-2769: The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.
CVE-2006-2769: The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:21.628892+00:00
redistributable_text
text
null
ccfb346e4af96aaa4913cedb
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
28895d2c7e1bce4a31dd
nvd_cve
2008-11-10T16:15:12.247000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2008-5035: The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length.
CVE-2008-5035: The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:26.686178+00:00
redistributable_text
text
null
68e8409a57d9384eda36b58d
hacker_exploits_posts
data/hacker_exploits_posts.jsonl
forumpost
hacker_community
130e3b5326090f876af4
persiantools
2026-04-15T22:02:51.155211+00:00
f0bf9f363d8389ee11dc59d8febfeb748e9b7a272edfadf678b4ff34111cec0a
نرم افزار :: Windows Mobile , Pocket Pc, Win CE ٠ یک برنامه برای فرستادن اس ام اس بصورت برنامه ریزی شده و در زمانهای از پیش تعیین شده. این برنامه قبلا روی تمام ویندوز موبایلها کار میکرد بجز 2006 که در این نسخه این مشکل هم حل شده. از خصوصیات این برنامه میشه به فرستادن تعداد نامحدود اس ام اس در زمانهای مختلف. فرستادن از...
نرم افزار :: Windows Mobile , Pocket Pc, Win CE ٠ یک برنامه برای فرستادن اس ام اس بصورت برنامه ریزی شده و در زمانهای از پیش تعیین شده. این برنامه قبلا روی تمام ویندوز موبایلها کار میکرد بجز 2006 که در این نسخه این مشکل هم حل شده. از خصوصیات این برنامه میشه به فرستادن تعداد نامحدود اس ام اس در زمانهای مختلف. فرستادن ا...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:04:40.388731+00:00
research_text_with_terms
research_text
null
c59ea3dcee722dda37f71f3f
github_advisory_posts
data/github_advisory_posts.jsonl
forumpost
advisory_reference
fe29428d12130a93f576
github_advisory
2026-03-11T00:37:44+00:00
2f0a9c5a08e3174efa07cb020db459fdac8fc6454522d783da6670b0c3dc72dc
Quill vulnerable to SSRF via unvalidated URL from Apple notarization log retrieval ### Impact Quill before version <CODE> contains a Server-Side Request Forgery (SSRF) vulnerability when attempting to fetch the Apple notarization submission logs. Exploitation requires the ability to modify API responses from Apple...
Quill vulnerable to SSRF via unvalidated URL from Apple notarization log retrieval [Severity: MEDIUM] ### Impact Quill before version `v0.7.1` contains a Server-Side Request Forgery (SSRF) vulnerability when attempting to fetch the Apple notarization submission logs. Exploitation requires the ability to modify API r...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:06.495276+00:00
redistributable_text
text
null
683d5b112c987e53e97976a3
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
b7753f41757d37ce64ad
exploit_db
2010-09-22T00:00:00+00:00
ec71efe2999e73441ad5d0ec682630db2d178e4782c183750c4244f5bd4edb77
Adobe Shockwave Director tSAC - Chunk Memory Corruption ''' __ __ ____ _ _ ____ | \/ |/ __ \ /\ | | | | _ \ | \ / | | | | / \ | | | | |_) | | |\/| | | | |/ /\ \| | | | _ < | | | | |__| / ____ \ |__| | |_) | |_| |_|\____/_/ \_\____/|____/ ''' ''' Title : Adobe Shockwave Director tSAC Chunk memory corruption ...
Adobe Shockwave Director tSAC - Chunk Memory Corruption ''' __ __ ____ _ _ ____ | \/ |/ __ \ /\ | | | | _ \ | \ / | | | | / \ | | | | |_) | | |\/| | | | |/ /\ \| | | | _ < | | | | |__| / ____ \ |__| | |_) | |_| |_|\____/_/ \_\____/|____/ ''' ''' Title : Adobe S...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:58.987902+00:00
redistributable_text
text
null
2eec8af1c0a81eb2471b0692
exploitdb_posts
data/exploitdb_posts.jsonl
forumpost
exploit_archive
921882caae2b2e8524ae
exploit_db
2013-02-11T00:00:00+00:00
830e5d2336664045000f657ec007b7273f1ccc7053080616225b69fe5d078e83
IP.Gallery 4.2.x/5.0.x - Persistent Cross-Site Scripting # Exploit Title: IP.Gallery 4.2.x and 5.0.x persistent XSS vulnerability # Date: 8/2/2013 # Exploit Author: Mohamed Ramadan # Author HomePage: <URL> # Author Twitter : <URL> # Vendor Homepage: <URL> # Software Link: <URL> # Version: IP.Gallery 4.2.x a...
IP.Gallery 4.2.x/5.0.x - Persistent Cross-Site Scripting # Exploit Title: IP.Gallery 4.2.x and 5.0.x persistent XSS vulnerability # Date: 8/2/2013 # Exploit Author: Mohamed Ramadan # Author HomePage: http://www.Attack-Secure.com # Author Twitter : https://twitter.com/Attack_Secure # Vendor Homepage: http://www.in...
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:51.321379+00:00
redistributable_text
text
null
fcf1e7dac43952f4a54964a2
exploitdb_hf_posts
data/exploitdb_hf_posts.jsonl
forumpost
exploit_qa_reference
145faf2e3eaeae4dda0c
exploitdb_hf
2000-01-01T00:00:00+00:00
90edeb5a4e9fe2162b1c04340e2f86a52430570e412b4ecf29784fbe7cc27d43
Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect. Author: Andrew Gill
Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect. Author: Andrew Gill
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:08:35.311391+00:00
research_text_with_terms
research_text
null
3cf636b1802c1df3dbd82a14
nvd_posts
data/nvd_posts.jsonl
forumpost
vulnerability_reference
574b085fba8077d0c537
nvd_cve
2009-01-06T17:30:00.467000+00:00
e20ff5b32e1f50dbbf182aafdd70ed89689aaa436c39a086a099409c14cb87ea
CVE-2008-5855: myPHPscripts Login Session 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to discover usernames, e-mail addresses, and password hashes via a direct request for users.txt.
CVE-2008-5855: myPHPscripts Login Session 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to discover usernames, e-mail addresses, and password hashes via a direct request for users.txt.
null
null
null
null
null
null
null
null
null
null
null
null
null
[]
[]
2026-04-26T20:09:26.875532+00:00
redistributable_text
text
null
End of preview.

HackerSignal

A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.

Overview

Statistic Value
Documents 7,447,646 (exact-deduplicated)
Sources 64 public forum/source identifiers
Source layers 8
Temporal span 1988--2026
CVE-linked rows 360,004
Benchmark tasks 3

Quick Start

from datasets import load_dataset

# Load the 10K stratified sample (24 MB)
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")

# Load a benchmark task
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")

# Load the full corpus (12 GB)
full = load_dataset("DatasetSubmission/HackerSignal", "default")

Source Layers

Layer Description Rows
hacker_community Forum posts from hacker/security communities 6,974,128
exploit_archive Published exploit code and advisories 197,393
vulnerability_reference NVD CVE descriptions and structured advisories 150,916
exploit_qa_reference Security Q&A and tutorial content 68,791
advisory_reference Vendor and third-party security advisories 30,361
bug_bounty_disclosure Public bug bounty reports 13,720
fix_commit_reference Vulnerability fix commit messages 11,104
exploitation_reference Active exploitation indicators (CISA KEV) 1,233

Benchmark Tasks

Task 1: CVE Linkage Retrieval (CVE-R)

Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Queries come from 22 source identifiers across exploit archives, advisories, fix commits, and bug bounty reports; filtered to ≥8 tokens.

Split Rows
Train 56,692
Val 2,584
Test 1,990
Corpus 340,536

Task 2: Exploit Type Classification (ETC)

8-class temporal OOD classification of exploit posts by type: injection, XSS, memory corruption, DoS, file inclusion, authentication/access bypass, RCE, and information disclosure. Sourced from ExploitDB and HackerOne public reports; split by publication year so test posts postdate all training examples.

Split Rows
Train 64,413
Val 4,735
Test 1,735

Task 3: Temporal Generalization (TG)

Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.

Split Rows
Train 56,833
Val 2,535
Test 1,898
Corpus 340,536

Schema

Each record in the main corpus contains:

Field Type Description
unified_id string SHA-256-derived release identifier
source_dataset string Input source file or dataset name
source_layer string Normalized layer (see above)
text string UTF-8 post/advisory text (max 8000 chars)
timestamp string ISO 8601 publication datetime (UTC)
forum_id string Source identifier
author_hash string SHA-256 pseudonymized author
release_mode string Governance mode (see below)

Release Governance

Records follow source-specific release modes:

  • redistributable_text (5 sources): Full text included under public-domain or CC licenses.
  • research_text_with_terms (9 sources): Text included with source attribution; no commercial reuse.
  • metadata_or_pointer_only (13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.

See docs/release_governance.md for the full source matrix, takedown policy, and responsible-use restrictions.

Responsible Use

This dataset is intended for defensive cybersecurity research only. Prohibited uses include:

  • Training systems for automated exploit code generation or malware
  • De-anonymizing forum participants outside approved research protocols
  • Operational blocking or law-enforcement decisions based solely on model outputs
  • Republishing text from metadata_or_pointer_only sources

Known Issues

  • HuggingFace dataset viewer row count: The viewer may display a partial count (~1M) for the default/full split because HF's streaming viewer cannot fully index files over ~10 GB. The actual row count is 7,447,646 as validated against the SHA-256 manifest.
  • Content-scanner warnings: HF's automated scanner flags several files (including the sample JSONL) as "Unsafe" due to exploit and vulnerability text. This is expected for a cybersecurity research dataset and does not indicate malicious content. See the Responsible Use section below.

Limitations

  • English-language bias; non-English communities may be underrepresented
  • Historical forum imports skew toward 2015--2017
  • Task labels are weak (CVE-linkage-derived), not human-annotated
  • ~8% near-duplicate content remains after exact deduplication
  • 1.57M rows under 8 tokens (useful for interaction analysis, not classification)

Citation

@misc{hackersignal2026,
  title={{HackerSignal}: A Temporally Structured, Multi-Source Benchmark for Cybersecurity Threat Intelligence},
  author={Anonymous},
  year={2026},
  howpublished={arXiv preprint}
}

License

Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.

Downloads last month
51