Skip to main content
an image demonstrating screenshots from our Insights product
HackerOne Insights

Insights across your vulnerability life cycle

Analyze vulnerability trends by leveraging the largest dataset of exploitable vulnerabilities, submitted by hackers and verified by HackerOne.

Go from insights to action

Get a snapshot of your security risk during a given timeframe and benchmark results against your past tests and industry peers—then chart a path forward.

an image demonstrating ranking reports from our Insights product

Find out how you rank against your peers.

Hackers have reported 70,000+ unique vulnerabilities on the HackerOne platform. We make sure valid data recorded for any customer benefits all customers, helping you make data-driven decisions.

  • Know whether your high-severity issues are comparable with those across your industry.
  • Access data that classifies and assigns vulnerabilities using Common Vulnerability Scoring System (CVSS) and Common Weakness Enumeration (CWE).
  • See your most common vulnerability types, number of reported vulnerabilities, and vulnerabilities by criticality to understand your attack surface.

Learn more about our insights.

Do you want additional clarity on vulnerability submissions and current status to help you manage your program?

A world of insights
HAC_May Vulnerability_Blog main image
Application Security, Data and Analysis

Spotlight on the Server-Side

Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous...

The Rise of IDOR
Data and Analysis, Vulnerability Management

The Rise of IDOR

Insecure Direct Object References (or IDOR) is a simple bug that packs a punch...

Top 10 Vulnerabilities
Vulnerability Management, Hacker Powered Security Report, Data and Analysis

Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and...