Get data from any page you want to get data from.
Need to talk to someone? Contact us—we’d love to help.
Get data from any page you want to get data from.
Need to talk to someone? Contact us—we’d love to help.
We are still busy preparing this batch of data. Please come back in a few minutes.
Seems like this data source was never ran before...
Changes are only available only when you have ran at least a second time.
Nope... guess no Martians around... Maybe set the webhook URL before pressing this button again...
Column 1 | Column 2 | Column 3 | Column 4 | Column 5 | origin_pattern | origin_url | createdAt | updatedAt | pingedAt |
---|---|---|---|---|---|---|---|---|---|
Apache Druid 0.20.0 Remote Command Execution exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Backdoor.Win32.Agent.afq Directory Traversal exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Backdoor.Win32.Agent.afq Heap Corruption exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Backdoor.Win32.Agent.afq Missing Authentication exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Cacti 1.2.12 - 'filter' SQL Injection / Remote Code Executio... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) exp... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
DzzOffice 2.02.1 Cross Site Scripting exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
FOGProject 1.5.9 - File Upload RCE (Authenticated) exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
GitHub Missing Audit Logging exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Hasura GraphQL 1.3.3 - Remote Code Execution exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Hasura GraphQL 1.3.3 Remote Code Execution exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Kimai 1.14 - CSV Injection exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Kimai 1.14 CSV Injection exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS) exploi... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Kirby CMS 3.5.3.1 Cross Site Scripting exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Montiorr 1.7.6m - File Upload to XSS exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Montiorr 1.7.6m Cross Site Scripting exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
OpenPLC 3 - Remote Code Execution (Authenticated) exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
OpenPLC 3 Remote Code Execution exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
PFSense 2.5.0 Cross Site Scripting exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2) exploi... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
SEO Panel 4.8.0 SQL Injection exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Sipwise C5 NGCP CSC Cross Site Scripting exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Trojan-Dropper.Win32.Dycler.vrp Insecure Permissions exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Trojan-Dropper.Win32.Injector.aobl Insecure Permissions exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
VMware vRealize Operations Manager Server-Side Request Forgery / Code ... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Windows 10 Wi-Fi Drivers For Intel Wireless Adapters 22.30.0 Privilege... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
WordPress Plugin WPGraphQL 1.3.5 - Denial of Service exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
WordPress WPGraphQL 1.3.5 Denial Of Service exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
Worm.Win32.Busan.k Insecure Transit exploit | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[dos] WordPress Plugin WPGraphQL 1.3.5 - Denial of Service | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Cacti 1.2.12 - 'filter' SQL Injection / Remote Code Executio... | Exploit Everything Hacker News Hacking tools KrebsOnSecurity Threat Post Security... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | |||
[webapps] Discourse 2.7.0 - Rate Limit Bypass leads to 2FA Bypass | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] FOGProject 1.5.9 - File Upload RCE (Authenticated) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Fast PHP Chat 1.3 - 'my_item_search' SQL Injection | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] GetSimple CMS My SMTP Contact Plugin 1.1.2 - CSRF to Stored ... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Hasura GraphQL 1.3.3 - Remote Code Execution | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Kimai 1.14 - CSV Injection | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Montiorr 1.7.6m - File Upload to XSS | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Moodle 3.10.3 - 'url' Persistent Cross Site Scripting | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] OTRS 6.0.1 - Remote Command Execution (2) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] OpenPLC 3 - Remote Code Execution (Authenticated) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] RemoteClinic 2.0 - 'Multiple' Stored Cross-Site Scripting (X... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2) | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Sipwise C5 NGCP CSC - 'Multiple' Stored/Reflected Cross-Site... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery ... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | ||||
[webapps] WordPress Plugin RSS for Yandex Turbo 1.29 - Stored Cross-Si... | http://sec.ud64.com/category/exploit | http://sec.ud64.com/category/exploit | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 | 2021-07-18 03:15:59 |
Sample code snippets to quickly import data set into your application
For more information on how to automatically trigger an import please reference our WebHook API guide
Integrating with Java
import java.io.BufferedReader; import java.io.InputStreamReader; import java.net.URL; import java.net.URLConnection; import java.util.Arrays; public class HelloWorld { public static void main(String[] args) { try { URL urlCSV = new URL( "https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv" ); URLConnection urlConn = urlCSV.openConnection(); InputStreamReader inputCSV = new InputStreamReader( ((URLConnection) urlConn).getInputStream() ); BufferedReader br = new BufferedReader(inputCSV); String line; String[] fields; while ((line = br.readLine()) != null) { // Each row fields = line.split(","); System.out.println(Arrays.toString(fields)); } // clean up buffered reader br.close(); } catch (Exception e) { System.out.println(e.getMessage()); } } }
Integrating with NodeJs
const csv = require('csv-parser'); const https = require('https'); const fs = require('fs'); const file = fs.createWriteStream("temp_download.csv"); const request = https.get( "https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv", function(response) { response.pipe(file); } ); file.on('finish', function() { file.close(); fs.createReadStream('temp_download.csv').pipe(csv()).on('data', (row) => { // Each row console.log(row); }).on('end', () => { console.log('CSV file successfully processed'); }); });
Integrating with PHP
$data = file_get_contents("https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv"); $rows = explode("\n",$data); $s = array(); foreach($rows as $row) { # Each row var_dump( $row); }
Integrating with Python
import csv import urllib2 url = 'https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv' response = urllib2.urlopen(url) cr = csv.reader(response) for row in cr: # Each row print row
Integrating with Ruby
require 'open-uri' require 'tempfile' require 'csv' temp_file = Tempfile.new( "getdata", :encoding => 'ascii-8bit') temp_file << open("https://cache.getdata.io/n94264_503829570cd7b8983b54d06e095ca818eses/latest_all.csv").read temp_file.rewind CSV.foreach( open(uri), :headers => :first_row ).each do |row| # Each row puts row end
created on 2025-01-14
Sevdiğin markaların yeni sezon ürünleri ve kampanya fırsatları Trendyol’da!
created on 2025-01-14