Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
CVE Software List
Browse Software CVEs
11812 CVEs Found
| CVE | Observations Sort ascending |
|---|---|
| CVE-2019-12827 | 6,257 |
| CVE-2024-1963 | 6,256 |
| CVE-2024-1736 | 6,256 |
| CVE-2024-4201 | 6,256 |
| CVE-2019-15639 | 6,246 |
| CVE-2025-52554 | 6,245 |
| CVE-2025-49595 | 6,236 |
| CVE-2023-6502 | 6,230 |
| CVE-2024-2874 | 6,230 |
| CVE-2021-41801 | 6,229 |
| CVE-2011-3379 | 6,225 |
| CVE-2009-0590 | 6,205 |
| CVE-2008-7270 | 6,200 |
| CVE-2002-0392 | 6,195 |
| CVE-2012-2749 | 6,184 |
| CVE-2019-15107 | 6,179 |
| CVE-2015-0881 | 6,172 |
| CVE-2019-15642 | 6,172 |
| CVE-2019-2991 | 6,160 |
| CVE-2019-2957 | 6,160 |
- Underground forum post offers various cyber exploits and data for sale
- Hacktivist group threatens to release files under #OpsExposeCJP operation
- STORM Stealer for Windows sold for $350/month
- Pythias Crypter, a metamorphic crypter tool, available for sale with multiple features
- Pythias Crypter offers a metamorphic crypter tool for various malware types with runtime features
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.