Exodus offers a world-class library of Zero-Day and N-Day vulnerabilities.
Each vulnerability in our catalog has been extensively researched and contains guidance allowing your organization to detect, mitigate, and investigate what affects you the most.
Exodus Intelligence shares vulnerability metadata to allow interested parties to understand the scope, severity, and impact of each vulnerability. As with all that we do, we only publish intelligence for vulnerabilities that are proven to be exploitable. Using the metadata, users can see whether they are interested in a specific vulnerability and decide whether they want to purchase all the details.
Exodus researchers are highly skilled in identifying and documenting truly exploitable Zero-Days, leading to a deep library of vulnerabilities. A Zero-Day vulnerability is a flaw discovered in software or hardware allowing an attacker access to a system or to protected information that has not yet been fixed by the application provider.
Exodus maintains a large store of N-Day vulnerability analysis and exploits for known flaws in commonly used software. An N-Day is a type of vulnerability that has already been fixed by the application provider. Once announced, security vendors often make updates to increase security until the patch can be deployed.