N-day Feed Updates

Exploits Feed

Below is the list of vulnerabilities and CVEs that have been thoroughly analysed by Crowdfense and are now part of our N-day Vulnerabilities Feed.

Each entry includes a comprehensive technical report, featuring:

  • In-depth root cause analysis

  • Exploitation context and impact assessment

A fully weaponised exploit accompanies most vulnerabilities, while others include a crash trigger or minimal proof-of-concept (PoC) to demonstrate exploitability.

With an increasing number of CVEs being reported every year, the vulnerability landscape is vast. Not every vulnerability poses the same level of risk, and others may be practically unexploitable.

Our process draws on sources such as CISA’s KEV catalogue, and we continuously track and analyse vulnerabilities exploited in the wild by APT groups, ransomware operators, and other cybercriminals. To determine whether an exploit is worth developing, we consider which attacks are most critical from an attacker’s perspective, which newly disclosed vulnerabilities are most likely to be used in real-world scenarios, and which exploits would provide the greatest value to our clients.

IDCVE YearCVEDescriptionVendorCapabilityStatusCISA KEVReleased Year
12020CVE-2020-17096Microsoft Windows NTFS (ntfs.sys) Memory CorruptionMicrosoftDoSpocFalse2024
22021CVE-2021-31956Microsoft Windows NTFS (ntfs.sys) Heap Buffer OverflowMicrosoftLPEweaponizedTrue2024
32021CVE-2021-40466Microsoft Windows Common Log File System Driver (clfs.sys) Heap Buffer OverflowMicrosoftLPEweaponizedFalse2024
42023CVE-2023-36845Juniper Firewall/VPN (JunOS) PHP External Variable ModificationJuniperpre-auth RCEweaponizedTrue2024
52024CVE-2024-114777-Zip Zstandard Decompression Integer Underflow7-ZipunexploitablepocFalse2024
62024CVE-2024-21338Microsoft Windows AppLocker (appid.sys) Untrusted Pointer DereferenceMicrosoftLPEweaponizedTrue2024
72024CVE-2024-30078Microsoft Windows Wi-Fi Driver (nwifi.sys) OOB WriteMicrosoftDoSpocFalse2024
82024CVE-2024-30085Microsoft Windows Cloud Files Mini Filter (cldflt.sys) Heap Buffer OverflowMicrosoftLPEweaponizedFalse2024
92024CVE-2024-30088Microsoft Windows Kernel TOCTOU Race ConditionMicrosoftLPEweaponizedTrue2024
102024CVE-2024-35250Microsoft Windows Kernel Streaming (ks.sys and ksthink.sys) Untrusted Pointer DereferenceMicrosoftLPEweaponizedTrue2025
112024CVE-2024-38054Microsoft Windows Kernel Streaming WOW Thunk Service (ksthunk.sys) Heap Based OverflowMicrosoftLPEweaponizedFalse2024
122024CVE-2024-38077Microsoft Windows Remote Desktop Licensing Service (TermServLicensing) Heap Overflow (madlicense)Microsoftpre-auth RCEweaponizedFalse2024
132024CVE-2024-38080Microsoft Windows Hyper-V Integer OverflowMicrosoftLPEweaponizedTrue2024
142024CVE-2024-38193Microsoft Windows Ancillary Function Driver for WinSock (afd.sys) Use After FreeMicrosoftLPEweaponizedTrue2024
152024CVE-2024-43572Microsoft Windows Management ConsoleMicrosoftRCEweaponizedTrue2024
162024CVE-2024-43639Microsoft Windows KDC Proxy (kpssvc.dll) Numeric Truncation ErrorMicrosoftunexploitablepocFalse2024
172024CVE-2024-46740Google Android (Linux Binder) Use After FreeGoogleLPEweaponizedFalse2025
182024CVE-2024-47575Fortinet Fortimanager Missing AuthenticationFortinetpre-auth RCEweaponizedTrue2024
192024CVE-2024-7965Google Chrome Android TurboFan Instruction Selection BugGoogleRCEweaponizedTrue2024
202024CVE-2024-43511Microsoft Windows Kernel TOCTOU Race ConditionMicrosoftunexploitablepocFalse2024
212024CVE-2024-38178Microsoft Windows Scripting Engine (JScript9.dll) Internet Explorer/Edge Chakra Engine Type ConfusionMicrosoftRCEweaponizedTrue2025
222024CVE-2024-49090Microsoft Windows Common Log File System Driver (clfs.sys) Untrusted Pointer DereferenceMicrosoftLPEweaponizedFalse2025
232025CVE-2025-21298Microsoft Windows OLE Double FreeMicrosoftunexploitablepocFalse2025
242025CVE-2025-9491Microsoft Windows LNK File UI Misrepresentation (ZDI-CAN-25373)MicrosoftRCEweaponizedFalse2025
252024CVE-2024-38189Microsoft Project Improper Input ValidationMicrosoftRCEweaponizedTrue2025
262024CVE-2024-43454Microsoft Windows Remote Desktop Licensing Service (TermServLicensing) Relative Path TraversalMicrosoftArbitrary File DeletionweaponizedFalse2025
272025CVE-2025-21293Active Directory Domain Services Improper Access ControlMicrosoftLPEweaponizedFalse2025
282020CVE-2020-9054Zyxel NAS and Firewall Devices Command InjectionZyXelpre-auth RCEweaponizedTrue2025
292025CVE-2025-24054Microsoft Windows File Explorer Spoofing VulnerabilityMicrosoftNTLM Hash DisclosureweaponizedTrue2025
302021CVE-2021-21551Dell DBUtil Driver (dbutil_2_3.sys) Insufficient Access ControlDellLPEweaponizedTrue2025
312023CVE-2023-36205Zemana AntiMalware/AntiLogger Driver (zamguard64.sys, zam64.sys) Incorrect Access ControlZemanaLPE, Arbitrary Process Termination (PPL)weaponizedFalse2025
322025CVE-2025-24985Microsoft Windows Fast FAT File System Driver Heap Buffer OverflowMicrosoftDoSpocTrue2025
3320250DAY-2025-0001Microsoft Management Console (MMC)MicrosoftNTLM Hash DisclosureweaponizedFalse2025
342025CVE-2025-26633Microsoft Management Console (MMC) Security Feature BypassMicrosoftRCEweaponizedTrue2025
352025CVE-2025-21333Microsoft Windows Hyper-V NT Kernel Integration VSP Driver (vkrnlintvsp.sys) Heap-based Buffer OverflowMicrosoftLPEweaponizedTrue2025
3620250DAY-2025-0002Flexense Computing System SyncBreezeFlexense Computing Systempre-auth RCEweaponizedFalse2025
372025CVE-2025-21375Microsoft Windows Kernel Streaming WOW Thunk Service Driver (ksthunk.sys) Buffer OverflowMicrosoftDoSpocFalse2025
382025CVE-2025-29824Microsoft Windows Common Log File System driver (CLFS.sys) Use After FreeMicrosoftDoSpocTrue2025
392025CVE-2025-32756Fortinet multiple products API Stack-based Buffer OverflowFortinetpre-auth RCEweaponizedTrue2025
402025CVE-2025-47955Microsoft Windows Remote Access Connection Manager (RasMan) Improper Privilege ManagementMicrosoftLPEweaponizedFalse2025
412025CVE-2025-1758Progress Kemp LoadMaster Stack-based Buffer OverflowProgressunexploitablepocFalse2025
422024CVE-2024-51324Baidu Antivirus BdApiUtil64.sys Driver Incorrect Access Control Arbitrary Process TerminationBaiduArbitrary Process Termination (PPL)weaponizedFalse2025
432025CVE-2025-25257Fortinet FortiWeb SQL Injection and Command InjectionFortinetpre-auth RCEweaponizedTrue2025
4420250DAY-2025-0003Asus MyAsus Arbitrary File WriteAsusLPEweaponizedFalse2025
452025CVE-2025-8088RARLAB WinRAR Directory TraversalRARLABRCEweaponizedTrue2025
462025ZDI-CAN-26372Microsoft Windows Theme File Parsing Improper Input ValidationMicrosoftNTLM Hash DisclosureweaponizedFalse2025
472025CVE-2025-50154Microsoft Windows File Explorer Spoofing VulnerabilityMicrosoftNTLM Hash DisclosureweaponizedFalse2025
482025CVE-2025-33053Internet Shortcut Files Remote Code Execution VulnerabilityMicrosoftRCEweaponizedTrue2025
4920250DAY-2025-0004SQLite3 Command Injection VulnerabilitySQLiteRCEweaponizedFalse2025
502025CVE-2025-53136Microsoft Windows NT OS Kernel Information Disclosure VulnerabilityMicrosoftKASLR Bypass (Info Disclosure)weaponizedFalse2025
512025CVE-2025-30397Microsoft Windows Scripting Engine (JScript9.dll) Internet Explorer/Edge Chakra Engine Type ConfusionMicrosoftRCEweaponizedTrue2025
522025CVE-2025-59287Microsoft Windows Server Update Service (WSUS) Unsafe DeserializationMicrosoftpre-auth RCEweaponizedTrue2025
532025CVE-2025-24893XWiki Unauthenticated Groovy Injection via SolrSearch MacroXWikipre-auth RCEweaponizedTrue2025
552025CVE-2025-64446Fortinet Fortiweb Path Traversal and Command InjectionFortinetpre-auth RCEweaponizedTrue2025