Vulnerabilities
Zero-Day Exploit
Also known as: 0-day exploit
Definition
Working exploit code for a vulnerability that the vendor does not yet know about, or for which no patch is available — extremely valuable to attackers.
Examples
- Pegasus spyware deploying iOS zero-click zero-day exploits.
- Operation Aurora (2009) — Internet Explorer zero-day chain against Google and others.
Related terms
Zero-Day Vulnerability
A security flaw that is unknown to the vendor (or for which no patch yet exists) at the moment it is discovered or exploited.
Exploit
A piece of code, data, or technique that takes advantage of a vulnerability to cause unintended behaviour such as code execution, privilege escalation, or information disclosure.
Weaponized Exploit
A reliable, fully developed exploit ready for real-world use — typically integrated into malware, intrusion frameworks, or attacker tradecraft.
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) — definition coming soon.
Spyware
Malware that secretly collects information about a user, device, or organization and sends it to an external party.
Vulnerability
A weakness in a system, application, or process that an attacker can exploit to violate confidentiality, integrity, or availability.