• vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack. The term "zero-day" originally referred to the number of days...
    25 KB (3,046 words) - 22:37, 13 July 2025
  • market for zero-day exploits is commercial activity related to the trafficking of software exploits. Software vulnerabilities and "exploits" are used to...
    20 KB (2,883 words) - 19:02, 30 April 2025
  • offers zero-day exploits is known as exploit as a service. There are several methods of classifying exploits. The most common is by how the exploit communicates...
    18 KB (1,951 words) - 07:23, 26 June 2025
  • FireEye as an advanced persistent threat. Among other things, it uses zero-day exploits, spear phishing and malware to compromise targets. The group promotes...
    90 KB (8,014 words) - 16:31, 10 May 2025
  • Thumbnail for Zero Day (film)
    Zero Day is a 2003 American found footage drama film written and directed by Ben Coccio and starring Andre Keuck and Cal Robertson, revolving around a...
    13 KB (1,473 words) - 02:47, 12 July 2025
  • Zerodium (category Computer security exploits)
    zero-day exploits from security researchers. Zerodium was launched on July 25, 2015 by the founders of Vupen. The company pays bounties for zero-day exploits...
    5 KB (403 words) - 10:29, 28 April 2025
  • the markets and associated events surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies, and related tools for...
    11 KB (1,028 words) - 08:20, 27 June 2025
  • and legally we could try to exploit in order to keep Americans safe from others. The commoditization of the Zero-Day exploit market changed the landscape...
    19 KB (2,169 words) - 16:55, 11 July 2024
  • published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch...
    18 KB (1,656 words) - 20:13, 13 June 2025
  • October 2020, Accellion was rebranded as Kiteworks. In late 2020, a zero-day exploit in Accellion’s legacy File Transfer Appliance (FTA) product led to...
    29 KB (2,370 words) - 18:59, 21 June 2025
  • EXTRABACON, a Simple Network Management Protocol exploit against Cisco's ASA software, was a zero-day exploit as of the time of the announcement. Juniper also...
    18 KB (1,724 words) - 08:46, 12 July 2025
  • Stuxnet (category Exploit-based worms)
    processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws in the systems, Stuxnet functions by targeting machines using...
    139 KB (12,051 words) - 09:01, 12 July 2025
  • Zero Day Attack (Chinese: 零日攻擊) is an upcoming 2025 Taiwanese speculative fiction television series, set against the fictional scenario of a People's Liberation...
    15 KB (1,316 words) - 04:21, 12 July 2025
  • Log4Shell (category Injection exploits)
    Log4Shell (CVE-2021-44228) is a zero-day vulnerability reported in November 2021 in Log4j, a popular Java logging framework, involving arbitrary code execution...
    36 KB (3,505 words) - 23:44, 10 July 2025
  • 22: Exploit Netgear Nighthawk RAX30 Routers". Claroty. Retrieved 2023-06-12. "Zero Day Initiative — Pwn2Own Toronto 2022 - Day Two Results". Zero Day Initiative...
    97 KB (7,725 words) - 13:04, 17 June 2025
  • Duqu (category Exploit-based worms)
    CentOS 5.x servers, leading some researchers to believe that they had a zero-day exploit for it. Servers are scattered in many different countries, including...
    13 KB (1,383 words) - 03:22, 11 May 2025
  • 2021 Microsoft Exchange Server data breach (category Computer security exploits)
    of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving...
    39 KB (3,582 words) - 12:54, 1 April 2025
  • Thumbnail for Phishing
    against the Pentagon email system in August 2015, and the group used a zero-day exploit of Java in a spear-phishing attack on the White House and NATO. Fancy...
    92 KB (8,520 words) - 15:56, 11 July 2025
  • "Council on Foreign Relations Website Hit by Watering Hole Attack, IE Zero-Day Exploit". Threatpost. 2012-12-29. Retrieved 2017-04-02. "ICS Focused Malware"...
    15 KB (1,502 words) - 13:11, 7 January 2025
  • Yahoo Mail (section Exploit)
    2007. Sarkar, Avik (November 29, 2012). "Egyptian Hackers Selling Zero-day Exploit of Yahoo! Mail For $700". Voice of Grey Hat. Retrieved November 29...
    43 KB (4,130 words) - 17:21, 13 July 2025
  • remotely install the spyware on iOS versions through 16.6 using a zero-click exploit. While the capabilities of Pegasus may vary over time due to software...
    180 KB (16,983 words) - 23:03, 6 July 2025
  • Zero Day Initiative (ZDI) is an international software vulnerability initiative that was started in 2005 by TippingPoint, a division of 3Com. The program...
    13 KB (942 words) - 23:10, 2 April 2025
  • Ivanti Pulse Connect Secure data breach (category Computer security exploits)
    institutions in both the US and Europe after the hackers created and used a Zero-day exploit for Ivanti Pulse Connect Secure VPN devices. A Cybersecurity and Infrastructure...
    6 KB (532 words) - 12:54, 1 April 2025
  • Thumbnail for Dangling pointer
    Dangling pointer (category Computer security exploits)
    2017-05-16. Chen, Xiaobo; Caselden, Dan; Scott, Mike (April 26, 2014). "New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted...
    15 KB (1,891 words) - 06:59, 11 June 2025
  • Thumbnail for Zoom (software)
    Franceschi-Bicchierai, Lorenzo (April 15, 2020). "Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000". Vice. Archived from the original on April 23, 2020....
    101 KB (8,694 words) - 22:51, 24 June 2025
  • Thumbnail for Goatse Security
    Keep Security Holes to Themselves," advocating the disclosure of any zero-day exploit only to individuals who will "use it in the interests of social justice...
    29 KB (2,309 words) - 16:54, 7 July 2025
  • Project Zero is the name of a team of security analysts employed by Google to find zero-day exploits. Project Zero may also refer to: The experimental...
    601 bytes (110 words) - 17:05, 15 June 2021
  • and validated by those manufacturers as being real exploits, some of which were zero-day exploits at the time of their exposure. The Cisco PIX and ASA...
    44 KB (5,337 words) - 03:03, 15 May 2025
  • Thumbnail for Vault 7
    Vault 7 (category Computer security exploits)
    security Global surveillance disclosures (2013–present) Market for zero-day exploits Proactive cyber defence The Shadow Brokers United States intelligence...
    90 KB (8,402 words) - 10:16, 25 June 2025
  • Thumbnail for Safari (web browser)
    for Windows, released on the same day as its announcement at WWDC 2007, contained several bugs and a zero day exploit that allowed remote code executions...
    141 KB (11,435 words) - 08:28, 14 July 2025