angler-fishThe Vulnerability History Project

Insights

Tag Trends

How can we cluster vulnerabilities? Discover commonalities in the way tags can overlap with this interactive Sankey diagram.

Known Offenders

What code tends to have repeated vulnerabilities? Explore vulnerabilities through the source code files they were found in.

Want to suggest another visualization?

Go to our Github

expand_less