🚨

Critical Alerts

-

Risk Score ≥ 80
⚠️

High Risk

-

Risk Score ≥ 60
🎯

CISA KEV

-

Actively Exploited
📋

Total CVEs

-

Last 14 days

System Status

Last update: Loading...

🚨 Critical Alerts - Immediate Action Required

Loading critical alerts...

📋 Recent High-Risk CVEs

Loading recent CVEs...

🔍 Browse CVE Database

Results: 0

📈 System Statistics

🎯 EPSS Exploit Probability Distribution

EPSS scores predict the likelihood of a CVE being exploited in the next 30 days

Severity Distribution

Data Sources Coverage

⚡ Top 10 CVEs by Exploit Probability (EPSS)

CVE ID EPSS Score Percentile Risk Score
Loading...

Top Affected Vendors

Loading vendors...

Common Flags

Loading flags...

ℹ️ About CVE 0-Day Monitor

🎯 Mission

Real-time monitoring and analysis of critical security vulnerabilities with focus on actively exploited 0-day threats. This platform aggregates data from multiple trusted sources to provide early warning of security risks.

📊 Data Sources

🇺🇸 NVD - National Vulnerability Database

Official U.S. government repository of standards-based vulnerability management data. Provides comprehensive CVE details with CVSS scores.

nvd.nist.gov ↗

🎯 CISA KEV - Known Exploited Vulnerabilities

Catalog of vulnerabilities that are actively being exploited in the wild. Maintained by the Cybersecurity and Infrastructure Security Agency.

cisa.gov ↗

🐙 GitHub Security Advisories

Security vulnerabilities in open-source projects hosted on GitHub. Includes PoC exploits and patch information.

github.com/advisories ↗

🔬 Trend Micro ZDI

Zero Day Initiative - Leading vulnerability research and disclosure program. Focuses on 0-day and advanced threats.

zerodayinitiative.com ↗

💥 ExploitDB

Archive of public exploits and corresponding vulnerable software. Community-driven exploit database.

exploit-db.com ↗

📦 PacketStorm Security

Information security news, files, tools, and exploits. Long-standing security research community.

packetstormsecurity.com ↗

🧮 Risk Scoring Methodology

Our risk score (0-100) is calculated using multi-source correlation:

  • CISA KEV = +100 (actively exploited in the wild)
  • ZDI Advisory = +60 (0-day research)
  • Exploit Available = +40 (public PoC)
  • Fresh (<7 days) = +30 (recent disclosure)
  • Critical CVSS (≥9.0) = +20 (high impact)
  • Multi-Source = +25 (confirmed by 2+ sources)
  • No Patch = +25 (unpatched vulnerability)

🔄 Update Frequency

Data is automatically refreshed every 6 hours via cron job. Manual refresh available in admin panel.

📧 Contact

For questions, issues, or collaboration inquiries:

Contact Form →

🔌 API Documentation

Base URL

https://www.mosom.pl/api

Public Endpoints

GET /api/cves

Get filtered CVE list with dynamic parameters

Query Parameters
  • min_risk - Minimum risk score (0-100)
  • severity - CRITICAL | HIGH | MEDIUM | LOW
  • source - cisa | zdi | exploits
  • cvss_min - Minimum CVSS score (0.0-10.0)
  • vendor - Vendor name (case-insensitive)
  • date_from - Start date (YYYY-MM-DD)
  • date_to - End date (YYYY-MM-DD)

Example:

GET /api/cves?min_risk=80&severity=CRITICAL
GET /api/stats

Get system statistics and data source metrics

GET /api/sources

Get information about data sources

GET /api/search?q={query}

Text search in CVE database (ID, summary, vendor)

GET /api/health

API health check

Authenticated Endpoints

⚠️ Requires API key (ESP32, Mobile Apps only)

GET /api/esp32?key={API_KEY}

Optimized lightweight JSON for embedded devices (ESP32)

Rate Limiting

Public endpoints: 60 requests/hour per IP

Authenticated endpoints: 500 requests/hour

Example Response

{
  "cves": [
    {
      "id": "CVE-2024-1234",
      "score": 9.8,
      "risk_score": 95,
      "severity_level": "CRITICAL",
      "summary": "Remote Code Execution in...",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1234",
      "published": "2024-01-15T10:00:00Z",
      "flags": ["CISA_KEV", "ACTIVELY_EXPLOITED"],
      "sources": {
        "cisa": true,
        "zdi": false,
        "exploits": true
      }
    }
  ],
  "count": 42,
  "alert_count": 5,
  "last_update": "2024-01-15T14:30:00Z"
}

Need API Access?

For API key (ESP32, mobile apps) or custom integration, contact admin:

Admin Panel →