Submit Your Research

Receive Your Pre-Offer

To receive a pre-offer for your zero-day research before and without submitting the full details, please provide minimal technical information using the form below.

ZERODIUM acquires zero-day research with fully functional exploits only. We do not acquire PoCs for theoretically exploitable or non-exploitable vulnerabilities. For more information, please read our Program and FAQ sections.

Important: Please check your spam/junk folder in case our emails are flagged as spam.

Minimal Technical Details

Your name


Your email address


Target software name + version(s) + architecture(s) (32bit, 64bit, or both)


Target OS version(s) + architecture(s) (32bit, 64bit, or both)


Vulnerability type/class (e.g. use-after-free, race condition, etc)


Attack scenario/vector (e.g. visit a web page, open a document, etc)


Success rate of the exploit (100% or less)
%

Time of execution of the exploit (in seconds)


What kind of shellcode/payload is provided with the exploit (explain)


Does the exploit include process continuation (no crash after exploitation)
Yes
No

Is the exploit working with default installations and settings
Yes
No

If it does not work with default installations or settings, please explain the requirements


Is the exploit requiring any authentication or credentials (explain)


Is the exploit requiring any user interaction (explain)


Is the exploit requiring any specific user privilege (explain)


What is the obtained privilege after a successful exploitation (explain)


Any other important information, limitations, or requirements


Your nationality and country of residence (for payment purposes)


Your public PGP key (if you have one)

  [You can install and use PGP by following these instructions for Windows, Mac, or Linux]

Please enter captcha text

 CAPTCHA