our mission

We aim to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them. We have a global reach, but do it Dutch style: open, honest, collaborative and for free.

Our statistics

Year # of cases # of vulnerable IPs notified
2020 14 58,358
2021 24 98,757
2022 40 186,123
2023 14 34


DIVD is a platform for security researchers to report vulnerabilities, supported by volunteers.


Code of Conduct

How and why we scan and report.


News & Events

Just getting started with some presentations here and there



Reports on closed research



Blog on current research by our Computer Security Incident Response Team



Who we collaborate with, our sponsors and references



We are a network of security researchers who mainly work online.






We need your support for our mission.

Current open cases

DIVD-2023-00017 - Cisco Small Business Router Authentication Bypass
DIVD-2023-00016 - GLPI Remote Code Execution
DIVD-2023-00014 - Critical Broken Authentication Flaw in Jira Service Management Products
DIVD-2023-00012 - Unauthenticated Remote Command Execution in IBM Aspera Faspex
DIVD-2023-00011 - FortiNAC and FortiWeb RCE Vulnerability
DIVD-2023-00010 - Remote Code Execution in Microsoft Exchange Server
DIVD-2023-00009 - Cisco RV Series Remote Command Execution
DIVD-2023-00007 - Global VMware ESXi Ransomware Attack
DIVD-2023-00006 - Unauthenticated code injection in QNAP QTS and QuTS hero
DIVD-2023-00004 - Unauthenticated Remote Command Execution using SAML in Zoho ManageEngine
DIVD-2023-00002 - Publicly Reachable Malicious Webshells
DIVD-2023-00001 - Citrix systems vulnerable for CVE-2022-27510 and/or CVE-2022-27518
DIVD-2022-00065 - Multiple Critical Vulnerabilities in multiple Zyxel EOL devices
DIVD-2022-00064 - Multiple injection vulnerabilities identified within Axiell Iguana CMS
DIVD-2022-00063 - Memory overflow vulnerability in FortiOS SSL VPN
DIVD-2022-00061 - KNXNet/IP gateways often left open to the internet
DIVD-2022-00056 - Critical authentication bypass affecting Fortigate products
DIVD-2022-00055 - Server Management Interfaces security issues
DIVD-2022-00054 - ProxyNotShell - Microsoft Exchange SSRF and RCE
DIVD-2022-00053 - Atlassian Bitbucket Server - CVE-2022-36804
DIVD-2022-00052 - Multiple vulnerabilities is Cloudflow software
DIVD-2022-00051 - H2 Web Console - CVE-2021-42392, CVE-2022-23221
DIVD-2022-00048 - Dossier Energy Transition
DIVD-2022-00045 - Injection vulnerability found within Socket.io
DIVD-2022-00042 - Canon print portals facing the internet
DIVD-2022-00032 - Exchange backdoor
DIVD-2022-00030 - Exposed QNAP
DIVD-2022-00020 - Inproper input validation vulnerabilities identified within Feathers.js
DIVD-2022-00017 - Global Healthcare Vulnerabilities
DIVD-2022-00007 - Subdomain Takeovers
DIVD-2022-00005 - Exposed BACnet devices
DIVD-2021-00014 - Kaseya Unitrends

All cases

Last 10 csirt blog posts

24 February 2023 - DIVD’s response regard the involvement of a DIVD volunteer in a major data theft case
18 January 2023 - Fox-IT and DIVD cooperate to warn owners of vulnerable Citrix servers
14 December 2022 - Fortinet sslvpnd vulnerability - update
13 December 2022 - Fortinet SSL VPN Vulnerability
15 August 2022 - Closing GeyNoise Ukraine Only case
10 August 2022 - Itarian Full disclosure
09 August 2022 - SmarterTrack Full disclosure
08 June 2022 - ITarian critical vulnerabilities
03 June 2022 - Confluence 0-day
04 April 2022 - Kaseya Full Disclosure

All posts