Exploited vulnerabilities
Monitoring
About this data
This data is currently limited to web-based server side exploits seen by our honeypot sensors. Incoming attacks are tagged with a CVE, EDB, CNVD or other tag when detection rules are added. The lack of a specific CVE does not imply it is not being used for exploitation or that we do not see it in our honeypots. Tags do not apply retroactively, so CVE data will be shown only after a tag is created.