Browse all 4 CVE security advisories affecting Zero Day Initiative. AI-powered Chinese analysis, POCs, and references for each vulnerability.
The Zero Day Initiative operates as a vulnerability coordination program, acquiring and responsibly disclosing zero-day vulnerabilities to improve software security. Historically, it has focused on critical classes including remote code execution, cross-site scripting, and privilege escalation flaws. The program maintains a database of 4 CVEs, demonstrating its role in identifying and documenting security gaps. While no major public incidents have been directly attributed to the program, its approach of purchasing vulnerabilities rather than publicly disclosing them has sparked debate within the security community about the balance between responsible disclosure and potential information control.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2017-10950 | Bitdefender Total Security bdfwfpf驱动程序安全漏洞 — Bitdefender Total SecurityCWE-415 | 7.8 | - | 2017-08-29 |
| CVE-2017-10951 | Foxit Reader 安全漏洞 — Foxit ReaderCWE-78 | 8.8 | - | 2017-08-29 |
| CVE-2017-10952 | Foxit Reader 安全漏洞 — Foxit ReaderCWE-693 | 8.8 | - | 2017-08-29 |
| CVE-2017-10949 | Dell Storage Manager 路径遍历漏洞 — Dell Storage Manager | 7.5 | - | 2017-08-04 |
This page lists every published CVE security advisory associated with Zero Day Initiative. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.