Total CVEs
0
Unique Vendors
0
Vulnerable Products
0
Patched Rate
0%
Vulnerability Types
Patch Status
Top Vendors
Patches Timeline
ZeroDay In the Wild Vulnerabilities
CVE | Vendor | Product | Type | Discovered | Patched | Status | Actions |
---|
๐ฏ About ZeroDay "In the Wild" Vulnerabilities
What are ZeroDay Vulnerabilities?
Security flaws unknown to vendors with no available patches. They represent critical risks as attackers can exploit them before defenses are in place.
Why Monitor Them?
Tracking helps organizations understand emerging threats, prioritize security updates, and maintain awareness of the evolving threat landscape.
"In the Wild" Detection
Real-world exploitation tracking
This dashboard tracks zero-day exploits detected "in the wild" - vulnerabilities found in real attacks against users before being known to the public or vendors. Data is collected from public sources and third-party analysis.
Inclusion Criteria
- โActive research targets
- โSecurity-supported software
- โPre-disclosure exploitation
- โHigh-confidence "in the wild" usage
Data Collection
- โขStarts from July 15, 2014
- โขSpecific discovery dates when available
- โขIncludes leaked exploit evidence
- โขExcludes post-disclosure exploitation
Data Source: Google Project Zero
Converted to JSON format for analysis