ZeroDayDB

SearchRecentAnalyticsWriteupsAPICLIMCP

Report a Vulnerability

Help us maintain a comprehensive vulnerability database by reporting newly discovered security issues or submitting additional context for existing entries.

Before You Report

Please search our database first to avoid duplicate submissions. If reporting a newly discovered vulnerability, ensure you have followed responsible disclosure practices with the affected vendor.

Data Correction
Not available through this live submission endpoint yet.

Add relevant tags like "web", "api", "authentication", "database", etc.

What Happens Next?

1. Review: Our team will review your submission to verify the information and check for duplicates.

2. Validation: If needed, we may reach out for additional details or clarification via the provided email address.

3. Publication: Once validated, the submission will be used to update the database or enrich the existing entry.

4. Attribution: If you'd like to be credited for the discovery, include contact details so reviewers can follow up.

ZeroDayDB

A comprehensive database of zero-day vulnerabilities and security research.

Navigate

  • Search
  • Recent
  • Analytics
  • Writeups
  • API
  • MCP
  • CLI

Resources

  • Ingestion Pipeline
  • Report an Issue
  • About

Legal

  • Code of Ethics
  • Terms of Service
  • Privacy Policy

© 2026 ZeroDayDB. All rights reserved.

Built with care for the security community