A recent research study published findings on Proof-of-Concept (POC) exploits. These exploits are typically categorized based on the type of vulnerability they target, whether they are local or remote, and the outcome of the exploit, such as EOP (Escalation of Privileges), DOS (Denial of Service), or Spoofing. One platform known for providing zero-day exploit options is Exploit-As-A-Service.
/Reports, release notes, official announcements.