• Market Insights
  • Community Data Catalog
  • Integrations
  • API Documentation
    • Documentation Overview
    • Quick start for getting Data
    • Quick start for exporting Data
    • Semantic Query Language
    • Data Source Management API
    • WebHooks API
    • Sentiment Analysis
  • Sign In
  • Sign Up for Free

Sign In

Sign in with Google
Sign in with LinkedIn
Sign in with GitHub
Forgot your password?
Sign up For Free

3 simple steps to get you started

Step 1. Watching this 55 seconds tutorial

Step 2. Get

Your Chrome Extension

Start your 55 seconds tutorial.

Step 3. Get data in a few clicks

Get data from any page you want to get data from.

Need more help?

Need to talk to someone? Contact us—we’d love to help.

3 simple steps to get you started

Step 1. Watching this 55 seconds tutorial

Step 2. Get

Your Chrome Extension

Start your 55 seconds tutorial.

Step 3. Get data in a few clicks

Get data from any page you want to get data from.

Need more help?

Need to talk to someone? Contact us—we’d love to help.

Opps...

We are still busy preparing this batch of data. Please come back in a few minutes.

Hmmm...

Seems like this data source was never ran before...

No changes detected

Changes are only available only when you have ran at least a second time.

Earth calling Mars...?

Nope... guess no Martians around... Maybe set the webhook URL before pressing this button again...

Server response
    

sec.ud64.com
Exploit - Security Alert

By
Super Affiliate Pro
2
Use for Free
  • Data Set Preview
  • Settings
  • Recipe
  • Collaborators
  • Sample Code
Harvested on
50
1
1
CSV JSON HTML Changes
Column 1Column 2Column 3Column 4Column 5origin_patternorigin_urlcreatedAtupdatedAtpingedAt
Apache Druid 0.20.0 Remote Command Execution exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Backdoor.Win32.Agent.afq Directory Traversal exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Backdoor.Win32.Agent.afq Heap Corruption exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Backdoor.Win32.Agent.afq Missing Authentication exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Cacti 1.2.12 - 'filter' SQL Injection / Remote Code Executio...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) exp...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
DzzOffice 2.02.1 Cross Site Scripting exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
FOGProject 1.5.9 - File Upload RCE (Authenticated) exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
GitHub Missing Audit Logging exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Hasura GraphQL 1.3.3 - Remote Code Execution exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Hasura GraphQL 1.3.3 Remote Code Execution exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Kimai 1.14 - CSV Injection exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Kimai 1.14 CSV Injection exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS) exploi...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Kirby CMS 3.5.3.1 Cross Site Scripting exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Montiorr 1.7.6m - File Upload to XSS exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Montiorr 1.7.6m Cross Site Scripting exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
OpenPLC 3 - Remote Code Execution (Authenticated) exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
OpenPLC 3 Remote Code Execution exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
PFSense 2.5.0 Cross Site Scripting exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2) exploi...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
SEO Panel 4.8.0 SQL Injection exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Sipwise C5 NGCP CSC Cross Site Scripting exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Trojan-Dropper.Win32.Dycler.vrp Insecure Permissions exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Trojan-Dropper.Win32.Injector.aobl Insecure Permissions exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
VMware vRealize Operations Manager Server-Side Request Forgery / Code ...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Windows 10 Wi-Fi Drivers For Intel Wireless Adapters 22.30.0 Privilege...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
WordPress Plugin WPGraphQL 1.3.5 - Denial of Service exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
WordPress WPGraphQL 1.3.5 Denial Of Service exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Worm.Win32.Busan.k Insecure Transit exploithttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[dos] WordPress Plugin WPGraphQL 1.3.5 - Denial of Servicehttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Cacti 1.2.12 - 'filter' SQL Injection / Remote Code Executio...Exploit Everything Hacker News Hacking tools KrebsOnSecurity Threat Post Security...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Discourse 2.7.0 - Rate Limit Bypass leads to 2FA Bypasshttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] FOGProject 1.5.9 - File Upload RCE (Authenticated)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Fast PHP Chat 1.3 - 'my_item_search' SQL Injectionhttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] GetSimple CMS My SMTP Contact Plugin 1.1.2 - CSRF to Stored ...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Hasura GraphQL 1.3.3 - Remote Code Executionhttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Kimai 1.14 - CSV Injectionhttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Montiorr 1.7.6m - File Upload to XSShttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Moodle 3.10.3 - 'url' Persistent Cross Site Scriptinghttp://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] OTRS 6.0.1 - Remote Command Execution (2)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] OpenPLC 3 - Remote Code Execution (Authenticated)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] RemoteClinic 2.0 - 'Multiple' Stored Cross-Site Scripting (X...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2)http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Sipwise C5 NGCP CSC - 'Multiple' Stored/Reflected Cross-Site...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery ...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
[webapps] WordPress Plugin RSS for Yandex Turbo 1.29 - Stored Cross-Si...http://sec.ud64.com/category/exploithttp://sec.ud64.com/category/exploit2021-07-18 03:15:592021-07-18 03:15:592021-07-18 03:15:59
Data source unique ID
n94264_503829570cd7b8983b54d06e095ca818eses
Privacy
Public
Last ran status
COMPLETED
Last ran
2021-07-18 03:15:59 UTC
Crawl Frequency
Not scheduled
Urls to Monitor
Use default URL in recipe

Sample code snippets to quickly import data set into your application

For more information on how to automatically trigger an import please reference our WebHook API guide


Integrating with Java

import java.io.BufferedReader;
import java.io.InputStreamReader;
import java.net.URL;
import java.net.URLConnection;
import java.util.Arrays;

public class HelloWorld {
  public static void main(String[] args) {

    try {
      URL urlCSV = new URL(
        "https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv"
      );

      URLConnection urlConn = urlCSV.openConnection();
      InputStreamReader inputCSV = new InputStreamReader(
        ((URLConnection) urlConn).getInputStream()
      );
      BufferedReader br = new BufferedReader(inputCSV);

      String line;
      String[] fields;
      while ((line = br.readLine()) != null) {
        // Each row
        fields = line.split(",");
        System.out.println(Arrays.toString(fields));

      }
      // clean up buffered reader
      br.close();


    } catch (Exception e) {
      System.out.println(e.getMessage());
    }
  }   
}


Integrating with NodeJs

const csv     = require('csv-parser');
const https   = require('https');
const fs      = require('fs');

const file = fs.createWriteStream("temp_download.csv");
const request = https.get(
  "https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv", 
  function(response) {
    response.pipe(file);
  }
);

file.on('finish', function() {
  file.close();
  fs.createReadStream('temp_download.csv').pipe(csv()).on('data', (row) => {
    // Each row
    console.log(row);

  }).on('end', () => {
    console.log('CSV file successfully processed');

  });
});



Integrating with PHP

$data = file_get_contents("https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv");
$rows = explode("\n",$data);
$s = array();
foreach($rows as $row) {

  # Each row
  var_dump( $row);
  
}


Integrating with Python

import csv
import urllib2

url = 'https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv'
response = urllib2.urlopen(url)
cr = csv.reader(response)

for row in cr:
  # Each row
  print row


Integrating with Ruby

require 'open-uri'
require 'tempfile'
require 'csv'

temp_file = Tempfile.new( "getdata", :encoding => 'ascii-8bit')
temp_file << open("https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv").read
temp_file.rewind

CSV.foreach( open(uri), :headers => :first_row ).each do |row|      
  # Each row
  puts row
end

Super Affiliate Pro owner

Related Data Sources

sdpondemand.manageengine.com

Detalles de la solicitud - Support, Infrastructure & Security

created on 2025-07-03

Oscar Orozco Salomon
1
345
bagden.kgk.gov.tr

KGK Yetkilendirilen Denetçiler

created on 2025-07-03

Furkan
1
2
dji.com

Charge It, Steady It, Shoot It: Power Stations & iPhone Gimbals for Epic Content

created on 2025-07-02

DJI
116
onlineyedekparca.com

Opel Yedek Parça Fiyatları ve Modelleri - OnlineYedekParca.com

created on 2025-07-02

fevzi KESER
1
19
More related data sources