Skip to content

A research-focused archive of publicly disclosed Windows zero-day vulnerabilities. This project summarizes CVEs, disclosure timelines, vendor advisories, and defensive mitigations. ⚠️ No exploit code included — educational and defensive use only.

License

Notifications You must be signed in to change notification settings

giriaryan694-a11y/exposed-win-zero-days

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

exposed-win-zero-days

image

A curated list of publicly exposed Windows zero-day vulnerabilities.

link : https://giriaryan694-a11y.github.io/exposed-win-zero-days/


📌 About

This repository documents publicly disclosed Windows zero-day vulnerabilities, including technical details, exploitation methods, affected systems, and mitigation strategies. The goal is to provide a centralized resource for cybersecurity researchers, IT professionals, and enthusiasts to understand the history and impact of Windows zero-days.



🔍 Vulnerabilities

CVE ID Description Year
CVE-2025-29824 Windows CLFS Zero-Day (Ransomware) 2025
CVE-2025-30400 Windows DWM Core Library Zero-Day 2025
CVE-2025-30397 Microsoft Scripting Engine Zero-Day 2025
CVE-2025-53779 Windows Kerberos Zero-Day (BadSuccessor) 2025
CVE-2024-49039 Windows Sandbox Escape Zero-Day 2024
CVE-2024-9680 Browser Zero-Day (Chrome) & Windows Exploit Chain 2024
CVE-2023-36033 Windows DWM Core Library Zero-Day 2023
CVE-2024-30051 Windows DWM Core Library Zero-Day (QakBot) 2024
CVE-2025-33053 Windows WebDAV Remote Code Execution Zero-Day 2025
CVE-2017-0144 EternalBlue (SMB Exploit) 2017
CVE-2024-21338 Windows AppLocker Driver Zero-Day 2024
CVE-2024-49138 Windows CLFS Zero-Day (Ransomware) 2024
CVE-2024-24993 Windows NTFS Zero-Day 2024
Stuxnet Stuxnet Zero-Days (4 Windows Zero-Days) 2010

last update : 28-08-2025

🚀 How to Use

  1. Browse the List: Start with the main page to see all documented zero-days.
  2. View Details: Click on any CVE ID to access detailed information about the vulnerability, including technical details, exploitation methods, and mitigation strategies.
  3. Stay Updated: This repository is updated as new zero-days are publicly disclosed.

🛠️ Contributing

Contributions are welcome! If you have information about a new or undocumented Windows zero-day, or if you’d like to improve the existing content, please:

  1. Fork the repository.
  2. Create a new branch for your changes.
  3. Add or update the relevant files.
  4. Submit a pull request with a clear description of your changes.

📜 License

This project is licensed under the MIT License. See the LICENSE file for details.


⚠️ Disclaimer

This repository is for educational and research purposes only. The information provided is intended to help cybersecurity professionals understand and mitigate vulnerabilities. Do not use this information for illegal or unauthorized activities.


🔒 Stay secure, stay informed!

About

A research-focused archive of publicly disclosed Windows zero-day vulnerabilities. This project summarizes CVEs, disclosure timelines, vendor advisories, and defensive mitigations. ⚠️ No exploit code included — educational and defensive use only.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages