Insights across your vulnerability life cycle
Analyze vulnerability trends by leveraging the largest dataset of exploitable vulnerabilities, submitted by hackers and verified by HackerOne.
Find out how you rank against your peers.
Hackers have reported 70,000+ unique vulnerabilities on the HackerOne platform. We make sure valid data recorded for any customer benefits all customers, helping you make data-driven decisions.
- Know whether your high-severity issues are comparable with those across your industry.
- Access data that classifies and assigns vulnerabilities using Common Vulnerability Scoring System (CVSS) and Common Weakness Enumeration (CWE).
- See your most common vulnerability types, number of reported vulnerabilities, and vulnerabilities by criticality to understand your attack surface.
The HackerOne program overview page helps sell the value of having a hacker-powered security program in place. We are able to understand changes in report workload to ensure our team is equipped to meet demand, drill down into key vulnerability trends across our program, and socialize key metrics to our CISO.
The program overview delivers contextual data across our vulnerability life cycle, allowing us to view trends and patterns over time so we can identify gaps and optimize our program.
HackerOne’s program overview provides deeper visibility into our program health. Our team can identify specific periods where targets are being hit and missed, and course-correct as necessary.
Learn more about our insights.
Do you want additional clarity on vulnerability submissions and current status to help you manage your program?
Spotlight on the Server-Side
Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous...
The Rise of IDOR
Insecure Direct Object References (or IDOR) is a simple bug that packs a punch...
Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year
HackerOne report reveals cross-site scripting, improper access control, and...