Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1046 articles · 101819 vulns · 38/41 feeds (7d)

Zero Day Monitor

A vulnerability intelligence platform built for security teams who want to stay on top of threats without depending on expensive commercial tools. Zero Day Monitor scans security news in real-time, analyzes it with AI, and gives you a clear picture of what matters right now.

The project is licensed under AGPL-3.0. Every component, from the AI analysis pipeline to the trending algorithm, is designed to be transparent and auditable. No vendor lock-in, no black boxes, no hidden data collection.

What You Can Do

Track what's trending

The Trendingpage shows which vulnerabilities are getting the most attention from independent security sources right now. A single vendor advisory with one source is routine. Three independent sources reporting on the same CVE? That's worth paying attention to. The trending score also factors in CISA KEV status, EPSS exploit probability, SSVC decision points, and community votes.

See what's urgent

On the Dashboard, switch between multiple sorting modes: Trending, Urgent, Newest, Critical, Weekly Urgent, and Weekly Trending. Each gives you a different perspective. "Urgent" prioritizes actively exploited vulnerabilities and critical severity with time decay. "Weekly Trending" shows what gained the most momentum over the past 7 days without time decay.

Search and filter

The Vulnerabilitiespage has full-text search and advanced filters. Filter by severity, CVSS range, EPSS range, vendor (including downstream affected vendors), CWE category, publication date, and vulnerability type (CVE, Pre-CVE, KEV). All filters combine, so you can find exactly what you need: "Critical Cisco vulnerabilities from the last 7 days with EPSS above 0.5".

Watch your vendors

As a registered user, you can build a vendor watchlist in your Preferences. Add the vendors whose products you use (Cisco, Microsoft, Fortinet, etc.) and the dashboard adapts: you get a personalized threat briefing, an attack surface overview, and patch coverage tracking for your specific stack. Supply-chain risks are included automatically. If a library your vendor depends on has a vulnerability, you'll see it.

Read AI threat briefings

Every day, the system generates a global threat briefing that summarizes what's happening in the vulnerability landscape. As a verifier, you also get a personalized vendor briefing tailored to your watchlist, with actionable recommendations: patch now, mitigate, or monitor. Both are available as 24-hour snapshots and 7-day weekly reviews with different perspectives. The daily briefing focuses on what's acute right now, the weekly one identifies patterns and looks ahead.

Discover zero-days before they get a CVE

When a security article describes a new vulnerability but no CVE has been assigned yet, the system creates a Pre-CVE event. These are tracked separately and automatically reconciled once a CVE ID appears. As a verifier, you can confirm zero-days, link them to CVE IDs once assigned, and submit new ones that the automated pipeline missed.

Vote, verify, and add context

Every vulnerability has community voting. Upvotes and downvotes signal how important or relevant the community considers a vulnerability, and the vote score directly influences trending rankings. Verifiers can go further: mark vulnerabilities as verified, corroborated, or flag them for admin review. They can also leave verification notes to provide context for other team members ("Confirmed in our environment", "Not applicable to our config"). Pin important vulnerabilities to your personal dashboard for quick access.

Track changes over time

Every vulnerability has a version history. When new information comes in (a patch is released, the CVSS score is updated, the severity changes), the system creates a versioned snapshot with a changelog. You can see exactly what changed, when, and from which source. A data completeness indicator shows how much information is available for each vulnerability and what fields are still missing.

Roles

Registration is invite-only. An admin creates invite links for new users.

User

Browse all vulnerabilities, trending data, and news. Set up a vendor watchlist. Vote on vulnerabilities. Read global threat briefings. Use advanced search and filters.

Verifier

Everything a user can do, plus: verify or flag vulnerabilities, link Pre-CVEs to real CVE IDs, confirm zero-days, submit new zero-day reports, leave verification notes, pin vulnerabilities, and access personalized vendor threat briefings. Verifiers work through a Review Queue of Pre-CVEs that need attention. When a verifier flags something as suspicious, it goes to the admin review queue. Verifiers are the backbone of data quality.

Admin

Full platform control. Make final false-positive decisions (which feed back into the algorithm to improve future accuracy), manage users and invites, configure the analysis pipeline, trigger data enrichment, and review flagged items. Admins also manage the LLM provider chain, system settings, and can regenerate threat briefings on demand.

How the Platform Learns

Zero Day Monitor doesn't just collect data. It improves over time through a closed-loop feedback system:

1.

Every article that enters the system gets a prefilter score. Articles below the threshold are dismissed as irrelevant.

2.

When an admin marks a vulnerability as false positive, or a dismissed article turns out to be a real vulnerability (false negative), these signals are recorded with full context: the score breakdown, the algorithm version, and the feed tier.

3.

A weekly feedback analyzer processes these signals and adjusts the prefilter weights. The adjustment is proportional: a single mistake causes a small correction, repeated patterns cause larger shifts. Weights have bounds to prevent degeneration.

4.

Precision, recall, and F1 scores are tracked weekly. A daily false-negative auditor automatically detects dismissed articles that matched later-discovered CVEs. The goal: fewer false positives without missing real vulnerabilities.

Supply-Chain Visibility

Most vulnerability trackers show you that OpenSSL has a CVE. Zero Day Monitor goes further: it tracks which downstream vendors and products are affected. When a core library vulnerability drops, you see not just the component itself but also every vendor in the database that ships or bundles that component. If you watch "Red Hat" in your vendor list, you'll see OpenSSL vulnerabilities too, because Red Hat packages OpenSSL.

This data comes from CPE entries (NVD/VulnCheck), MITRE affected lists, GitHub Security Advisories, and BSI CSAF product trees. The threat briefings group supply-chain risks separately so you can see at a glance where your vendors are affected as a downstream dependency.

Source Trust Hierarchy

Not all security sources are equally reliable. The platform uses a 5-tier trust system based on the Admiralty Code. Higher-tier sources can overwrite data from lower tiers, but not the other way around. This prevents low-quality sources from corrupting authoritative data.

Tier A · Authoritative

NVD, CVE API, CISA, Vendor PSIRTs (Microsoft, Cisco, Fortinet, Adobe)

Tier B · Government CERTs

BSI, CERT-EU, NCSC, JPCERT, AusCERT, CERT-FR

Tier C · Security Research

Project Zero, Rapid7, Talos, Qualys, Tenable, Wordfence

Tier D · Security News

BleepingComputer, The Hacker News, SecurityWeek, Dark Reading

What's Next

PLANNED
Email Alerting · Configurable alerts for critical CVEs, vendor-specific threats, and Pre-CVE events.
PLANNED
Public Source Code · The source code will be made available to contributors and collaborators. Full public release planned once the project matures further.
PLANNED
Public REST API · Authenticated access to vulnerability data, trending scores, and briefings for integration with your own tools.
PLANNED
ISO Role System · Dedicated workflows for ISO 27001 compliance: risk assessment templates, audit trails, and reporting.
PLANNED
STIX/TAXII Export · Standard threat intelligence formats for SIEM and SOAR integration.

Technology & License

Zero Day Monitor is licensed under AGPL-3.0. The source code is not yet publicly available but will be shared with contributors and collaborators as the project grows, with a full public release planned for a later stage.

The platform is built with Next.js, PostgreSQL (with pgvector for semantic search), Redis, and a 7-provider LLM fallback chain that prioritizes free providers before paid ones. Self-hosting will be supported via Docker Compose once the source is published.

Back to DashboardImpressumPrivacy