Today’s adversaries relentlessly probe for weaknesses in organizations’ digital defenses. They seek to use vulnerability exploits to install ransomware, information-stealing malware, and perform other cyber attacks. With over 32,928 vulnerabilities disclosed in 2024 alone, organizational attack surfaces are rapidly expanding. This makes prioritization more critical than ever.
There are simply too many vulnerabilities for organizations to triage all at once. Not every issue requires immediate attention. Security professionals know this, but they often lack the vulnerability intelligence (VI) needed to make informed decisions. Organizations have traditionally relied on VI sources like the Common Vulnerability Exposures (CVE) and National Vulnerability Database (NVD). Time has shown that they fall short. They do not provide the necessary actionable insights and context. Organizations need enriched vulnerability intelligence beyond CVE and NVD to take action that drives change.
Flashpoint Vulnerability Intelligence: Going Beyond CVE and NVD
The sheer volume of vulnerabilities facing organizations today is massive. Over 380,000 vulnerabilities have been disclosed since the CVE program began—a 3,129% increase. Worse still, over 104,000 vulnerabilities are missed by CVE and NVD. These affect a wide variety of major vendors, as well as widely-used third-party libraries.
Consequently, security operations that rely solely on public data sources may have less than 70% visibility into the actual vulnerability landscape. This limitation, coupled with the dynamic nature of threat actor tactics, makes vulnerability prioritization the crucial part of an efficient exposure and vulnerability management operation. The real challenge, however, lies in identifying which vulnerabilities are actively being targeted by threat actors.
Enriching Vulnerability Intelligence with Real-Time Threat Insights
Flashpoint’s researchers tirelessly hunt for vulnerabilities across the internet. This includes public disclosures and the darkest corners of the web. Our intelligence teams monitor billions of discussions. These take place among illicit marketplaces, forums, and communities where malicious actors talk or solicit vulnerability exploits. We aggregate these into an easy-to-use platform via weekly vulnerability reports.
| CVE ID | Vendor | CVSSv3 | Exploit Details |
|---|---|---|---|
| CVE-2024-3094 | XZ Utils | 9.8 | Remote / Network Access |
| CVE-2024-21762 | Fortinet | 9.8 | Remote / Network Access |
| CVE-2024-6387 | OpenSSH | 8.1 | Remote / Network Access |
| CVE-2024-38062 | Microsoft | 9.8 | Remote / Network Access |
| CVE-2024-23113 | Fortinet | 9.8 | Remote / Network Access |
This multi-faceted approach ensures that Flashpoint delivers the most comprehensive, timely, and actionable vulnerability intelligence available. This approach includes proactively monitoring thousands of websites and developer resources. Our intelligence is enriched with real-time threat insights.
This allows us to deliver the largest, deepest, and broadest collection of publicly disclosed vulnerabilities. The unique details of vulnerability metadata give security teams a multi-dimensional view of each issue. This view provides insights into:
- Severity: Our experts refine CVSSv2 and v3 scores by correcting any inaccuracies in CVE/NVD assessments, providing detailed explanations and analysis to ensure the most accurate vulnerability assessment possible.
- Exploitability: Flashpoint vulnerability intelligence identifies vulnerabilities with known exploit code or proof-of-concept exploits, while also clarifying if threat actors can leverage them remotely. Users can also access the exploit’s exact post (if known) saving valuable time and resources.
- Threat Likelihood: Leveraging best-in-class threat intelligence, vulnerability intelligence cn provide additional layers of insight and analysis of issues that are being actively discussed by threat actor groups and communities, as well as the probability of an exploit being used in ransomware operations.
How Flashpoint Can Enable Better Prioritization
Teams that rely heavily on vulnerability intelligence benefit greatly from intelligence that streamlines the workflows. This includes vulnerability management teams, Security Operation Center (SOC) teams, Cyber Threat Intelligence (CTI) teams, threat hunters, and others.
A metadata-rich vulnerability database enables organizations to efficiently source, prioritize, and fix relevant threats. This includes those not found in public sources. Organizations can search for the exact vulnerabilities that affect their systems, software, and bundled third-party libraries. They can then prioritize them according to their own VM frameworks.
For example, security teams that emphasize exploitability can filter their entire workload and backlog. They can show only remote code executions, issues with known public exploits, or vulnerabilities that are being exploited-in-the-wild. If organizations value severity, they can simplify vulnerability reports. They can show only issues with CVSSv2 or v3 scores above 9.0.
Flashpoint recommends that security professionals focus on high severity vulnerabilities with public exploits that have a known solution. Taking this approach saves time and resources. Organizations focus on dangerous vulnerabilities that they can actually fix or mitigate. Leveraging this, critical vulnerability workloads can be reduced by nearly 83%.

Compared to the CISA KEV, Flashpoint’s KEV catalog provides a much more extensive view of actively exploited vulnerabilities. It offers over 216% greater coverage. The original is limited by CVE/NVD’s shortcomings. Our catalog spans Flashpoint’s entire vulnerability collection. This includes our coverage of non-CVEs. It also includes our monitoring of threat intelligence sources. Examples are dark web and botnet monitoring, malware analysis, and more. In addition, our intelligence teams provide weekly vulnerability reports. These highlight specific CVEs that require attention due to their potential impact or wide-spread discussion amongst threat actors. Security teams can efficiently focus their remediation efforts and reduce their attack surface with metadata-rich intelligence.
Elevate Vulnerability Management with Flashpoint
Organizations need an intelligence-led approach that combines best-in-class vulnerability and threat intelligence. Security professionals can achieve a robust security operation by leveraging the highest quality data and insights to drive action. This operation provides value across vulnerability management programs, purple team exercises, incident response, and more. This safeguards critical assets against adversary exploitation. Request a demo today to see how Flashpoint can transform your vulnerability management program.


