Intelligence Overview
What's in the database
1,278Talks Indexed
1,886Tools Tracked
792CVEs Documented
50Conferences
Talks by Category
Talk Types Distribution
research presentation (46%)
talk (23%)
panel (3%)
exploit demo (3%)
tool demo (1%)
keynote (1%)
Talks by Conference Year
Top Tools
Top Vulnerabilities
#1privilege-escalation
(78)#2remote-code-execution
(66)#3denial-of-service
(50)#4authentication-bypass
(49)#5command-injection
(48)#6misconfiguration
(47)#7memory-corruption
(46)#8information-disclosure
(44)#9path-traversal
(38)#10race-condition
(38)#11integer-overflow
(35)#12use-after-free
(34)#13sql-injection
(31)#14cross-site-scripting
(30)#15broken-access-control
(29)OWASP Top 10 Coverage
A01 Broken Access Control0 talks
A02 Cryptographic Failures0 talks
A03 Injection0 talks
A04 Insecure Design0 talks
A05 Security Misconfiguration0 talks
A06 Vulnerable Components0 talks
A07 Auth Failures0 talks
A08 Integrity Failures0 talks
A09 Logging Failures0 talks
A10 SSRF0 talks
