Glossary  /  Threats

Glossary

What is a zero-day?

A zero-day is a vulnerability that's being exploited before the vendor knows it exists, or before a patch is available. The "zero" is the number of days defenders have had to react.

The three states

The phrase gets used loosely. To be precise:

A vulnerability stops being a zero-day the moment the vendor knows about it. From the patch's release to it being applied across the estate, the same flaw becomes an n-day — still exploitable on unpatched systems, but defenders now have something to deploy.

Who finds them

How to know it's being exploited

The signal usually shows up in one of three places:

The window between disclosure and mass exploitation has shrunk dramatically. For some classes of bug (web-app, network-edge appliances), automated scanning starts within hours of a patch dropping. For others (memory-corruption in less-juicy targets), it can take weeks.

Why the "exploited in the wild" badge matters. Most CVEs are never exploited. CVSS gives a vulnerability its theoretical severity. Exploitation status tells you whether that theory has met reality yet. A CVSS 9.8 that nobody's exploiting is a lower priority than a CVSS 7.2 that's in the KEV catalog.

What to do when one drops

ThreatCluster surfaces actively-exploited CVEs on the exploits hub with KEV, EPSS, public PoC availability, and related actor activity all in one view per CVE.

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.