ZeroDayExploits
Zero-day exploits are vulnerabilities in software that are unknown to the vendor and for which no patch exists at the time of discovery. When attackers craft and use an exploit to take advantage of such a vulnerability, the attack is described as a zero-day exploit. The term reflects the fact that defenders have zero days of warning before it can be exploited in the wild.
Discovery often comes from independent researchers, bug bounty programs, or intelligence gathering. Responsible disclosure programs coordinate
Impact and exploitation: Zero-day exploits can enable remote code execution, privilege escalation, or data leakage, among
Markets and ethics: An illicit market exists for trading or selling zero-day exploits, while legitimate security
Legal and policy: Many jurisdictions regulate exploit trading and disclosure; CERTs and security communities encourage prompt