Blog
May 2, 2016
A Decade of Exploit Database Data
Managing the Exploit Database is one of those ongoing tasks that ends up taking a significant amount of time and often, we don’t take the time to step back and look at the trends as they occur over time. Have there been more exploits over the years? Perhaps fewer? Is there a shift in platforms being targeted? Has the bar for exploits indeed been raised with the increase in more secure operating system protections?
1 min read

Managing the Exploit Database is one of those ongoing tasks that ends up taking a significant amount of time and often, we don’t take the time to step back and look at the trends as they occur over time. Have there been more exploits over the years? Perhaps fewer? Is there a shift in platforms being targeted? Has the bar for exploits indeed been raised with the increase in more secure operating system protections?
Recently, one of our users reached out to us and showed us a great dashboard he created with Tableau using the publicly available CSV file we publish in our Exploit Database GitHub repository. We really liked this idea a lot and decided to run with it and see what kind of questions we could ask and answer with the available data. What makes these dashboards particularly useful is that they are not simply static displays; you can interact with them like the one below.
We find these glimpses into our data fascinating and we hope you will, too. A new statistics page has been created over at the Exploit Database that we will update on a monthly basis at minimum so please feel free to check it out regularly, interact with the dashboard, and join us in seeing how the world of exploitation changes over time.
Latest from OffSec

OffSec News
Learn Secure Java Development with OffSec’s New Course
Master secure Java coding with OffSec’s SJD-100 course. Enhance app security and gain hands-on experience to secure your coding practices.
Mar 18, 2025
4 min read

Insights
Creating an Inclusive Cybersecurity Culture
Transform your cybersecurity culture by strategically improving women’s representation and cultivating meaningful inclusion.
Mar 17, 2025
4 min read

Research & Tutorials
PostgreSQL Exploit
Sharpen your hacking skills! Learn from our walkthrough of a PostgreSQL exploit in the Nibbles machine on PG Practice.
Mar 12, 2025
4 min read