our mission

We aim to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them. We have a global reach, but do it Dutch style: open, honest, collaborative and for free.

Our statistics

Year # of cases # of vulnerable IPs notified
2020 14 58,358
2021 24 98,757
2022 42 213,769
2023 17 27,495
Icon

Team

DIVD is a platform for security researchers to report vulnerabilities, supported by volunteers.

Icon

Code of Conduct

How and why we scan and report.

Icon

News & Events

Just getting started with some presentations here and there

Icon

REPORTS

Reports on closed research

Icon

CSIRT

Blog on current research by our Computer Security Incident Response Team

Icon

PARTNERS

Who we collaborate with, our sponsors and references

Icon

CONTACT

We are a network of security researchers who mainly work online.

Icon

JOIN

Join DIVD

Icon

DONATE

We need your support for our mission.

Current open cases

DIVD-2023-00022 - OS command injection vulnerability of Zyxel firewalls
DIVD-2023-00021 - Multiple vulnerabilities in Danfoss AK-EM 100
DIVD-2023-00020 - PaperCut MF/NG Authentication Bypass
DIVD-2023-00017 - Cisco Small Business Router Authentication Bypass
DIVD-2023-00011 - FortiNAC and FortiWeb RCE Vulnerability
DIVD-2023-00010 - Remote Code Execution in Microsoft Exchange Server
DIVD-2023-00009 - Cisco RV Series Remote Command Execution
DIVD-2023-00002 - Publicly Reachable Malicious Webshells
DIVD-2022-00068 - Multiple vulnerabilities identified within White Rabbit Switch from CERN
DIVD-2022-00065 - Multiple Critical Vulnerabilities in multiple Zyxel EOL devices
DIVD-2022-00064 - Multiple injection vulnerabilities identified within Axiell Iguana CMS
DIVD-2022-00063 - Memory overflow vulnerability in FortiOS SSL VPN
DIVD-2022-00061 - KNXNet/IP gateways often left open to the internet
DIVD-2022-00058 - ZK Framework - ZK AuUploader Servlet Upload Vulnerability
DIVD-2022-00056 - Critical authentication bypass affecting Fortigate products
DIVD-2022-00055 - Server Management Interfaces security issues
DIVD-2022-00053 - Atlassian Bitbucket Server - CVE-2022-36804
DIVD-2022-00052 - Multiple vulnerabilities is Cloudflow software
DIVD-2022-00048 - Dossier Energy Transition
DIVD-2022-00045 - Injection vulnerability found within Socket.io
DIVD-2022-00032 - Exchange backdoor
DIVD-2022-00030 - Exposed QNAP
DIVD-2022-00017 - Global Healthcare Vulnerabilities
DIVD-2021-00014 - Kaseya Unitrends

All cases

Last 10 csirt blog posts

24 February 2023 - DIVD’s response regard the involvement of a DIVD volunteer in a major data theft case
18 January 2023 - Fox-IT and DIVD cooperate to warn owners of vulnerable Citrix servers
14 December 2022 - Fortinet sslvpnd vulnerability - update
13 December 2022 - Fortinet SSL VPN Vulnerability
15 August 2022 - Closing GeyNoise Ukraine Only case
10 August 2022 - Itarian Full disclosure
09 August 2022 - SmarterTrack Full disclosure
08 June 2022 - ITarian critical vulnerabilities
03 June 2022 - Confluence 0-day
04 April 2022 - Kaseya Full Disclosure

All posts