
Insights across your vulnerability life cycle
Analyze vulnerability trends by leveraging the largest dataset of exploitable vulnerabilities, submitted by hackers and verified by HackerOne.
Find out how you rank against your peers.
Hackers have reported 70,000+ unique vulnerabilities on the HackerOne platform. We make sure valid data recorded for any customer benefits all customers, helping you make data-driven decisions.
- Know whether your high-severity issues are comparable with those across your industry.
- Access data that classifies and assigns vulnerabilities using Common Vulnerability Scoring System (CVSS) and Common Weakness Enumeration (CWE).
- See your most common vulnerability types, number of reported vulnerabilities, and vulnerabilities by criticality to understand your attack surface.
Learn more about our insights.
Do you want additional clarity on vulnerability submissions and current status to help you manage your program?
Spotlight on the Server-Side
Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous...
The Rise of IDOR
Insecure Direct Object References (or IDOR) is a simple bug that packs a punch...
Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year
HackerOne report reveals cross-site scripting, improper access control, and...