A curated list of publicly exposed Windows zero-day vulnerabilities.
link : https://giriaryan694-a11y.github.io/exposed-win-zero-days/
This repository documents publicly disclosed Windows zero-day vulnerabilities, including technical details, exploitation methods, affected systems, and mitigation strategies. The goal is to provide a centralized resource for cybersecurity researchers, IT professionals, and enthusiasts to understand the history and impact of Windows zero-days.
| CVE ID | Description | Year |
|---|---|---|
| CVE-2025-29824 | Windows CLFS Zero-Day (Ransomware) | 2025 |
| CVE-2025-30400 | Windows DWM Core Library Zero-Day | 2025 |
| CVE-2025-30397 | Microsoft Scripting Engine Zero-Day | 2025 |
| CVE-2025-53779 | Windows Kerberos Zero-Day (BadSuccessor) | 2025 |
| CVE-2024-49039 | Windows Sandbox Escape Zero-Day | 2024 |
| CVE-2024-9680 | Browser Zero-Day (Chrome) & Windows Exploit Chain | 2024 |
| CVE-2023-36033 | Windows DWM Core Library Zero-Day | 2023 |
| CVE-2024-30051 | Windows DWM Core Library Zero-Day (QakBot) | 2024 |
| CVE-2025-33053 | Windows WebDAV Remote Code Execution Zero-Day | 2025 |
| CVE-2017-0144 | EternalBlue (SMB Exploit) | 2017 |
| CVE-2024-21338 | Windows AppLocker Driver Zero-Day | 2024 |
| CVE-2024-49138 | Windows CLFS Zero-Day (Ransomware) | 2024 |
| CVE-2024-24993 | Windows NTFS Zero-Day | 2024 |
| Stuxnet | Stuxnet Zero-Days (4 Windows Zero-Days) | 2010 |
- Browse the List: Start with the main page to see all documented zero-days.
- View Details: Click on any CVE ID to access detailed information about the vulnerability, including technical details, exploitation methods, and mitigation strategies.
- Stay Updated: This repository is updated as new zero-days are publicly disclosed.
Contributions are welcome! If you have information about a new or undocumented Windows zero-day, or if you’d like to improve the existing content, please:
- Fork the repository.
- Create a new branch for your changes.
- Add or update the relevant files.
- Submit a pull request with a clear description of your changes.
This project is licensed under the MIT License. See the LICENSE file for details.
This repository is for educational and research purposes only. The information provided is intended to help cybersecurity professionals understand and mitigate vulnerabilities. Do not use this information for illegal or unauthorized activities.
🔒 Stay secure, stay informed!