Score: 0

An empirical analysis of zero-day vulnerabilities disclosed by the zero day initiative

Published: December 16, 2025 | arXiv ID: 2512.15803v1

By: Apurva Shet, Izzat Alsmadi

Potential Business Impact:

Finds hidden computer flaws before hackers do.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

Zero-day vulnerabilities represent some of the most critical threats in cybersecurity, as they correspond to previously unknown flaws in software or hardware that are actively exploited before vendors can develop and deploy patches. During this exposure window, affected systems remain defenseless, making zero-day attacks particularly damaging and difficult to mitigate. This study analyzes the Zero Day Initiative (ZDI) vulnerability disclosures reported between January and April 2024, Cole [2025] comprising a total of 415 vulnerabilities. The dataset includes vulnerability identifiers, Common Vulnerability Scoring System (CVSS) v3.0 scores, publication dates, and short textual descriptions. The primary objectives of this work are to identify trends in zero-day vulnerability disclosures, examine severity distributions across vendors, and investigate which vulnerability characteristics are most indicative of high severity. In addition, this study explores predictive modeling approaches for severity classification, comparing classical machine learning techniques with deep learning models using both structured metadata and unstructured textual descriptions. The findings aim to support improved patch prioritization strategies, more effective vulnerability management, and enhanced organizational preparedness against emerging zero-day threats.

Country of Origin
🇺🇸 United States

Page Count
15 pages

Category
Computer Science:
Cryptography and Security