[{"data":1,"prerenderedAt":78},["ShallowReactive",2],{"term-z\u002Fzero-day":3,"related-z\u002Fzero-day":60},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":44,"meta":45,"navigation":46,"path":47,"related":48,"seo":54,"sitemap":55,"stem":58,"subcategory":6,"__hash__":59},"terms\u002Fterms\u002Fz\u002Fzero-day.md","Zero-Day",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"A zero-day is a vulnerability that nobody knows about yet — except the person who found it. The name means the vendor has had 'zero days' to fix it. Hackers who find zero-days can exploit them with no defense available. They're worth a ton of money on the underground market.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"A zero-day vulnerability is one that is unknown to the software vendor, meaning no patch exists. When disclosed publicly without a fix available ('zero-day release'), it creates a window of maximum risk. Zero-days discovered by researchers are typically reported privately for a fix period before public disclosure.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"A zero-day in the browser was exploited before the vendor knew about it.\" \u002F \"The security team monitors threat feeds for zero-day advisories.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","A zero-day is a vulnerability that nobody knows about yet — except the person who found it. The name means the vendor has had 'zero days' to fix it.","intermediate","md","z",{},true,"\u002Fterms\u002Fz\u002Fzero-day",[49,50,51,52,53],"Vulnerability","Exploit","Patch","Bug Bounty","Penetration Testing",{"title":5,"description":41},{"changefreq":56,"priority":57},"weekly",0.7,"terms\u002Fz\u002Fzero-day","XcB382M4zNT3aqzqIm_iALa7_tF3ohZsL2rhQQOAoNE",[61,65,68,72,75],{"title":52,"path":62,"acronym":6,"category":40,"difficulty":63,"description":64},"\u002Fterms\u002Fb\u002Fbug-bounty","beginner","A bug bounty program pays ethical hackers to find security vulnerabilities in your product.",{"title":50,"path":66,"acronym":6,"category":40,"difficulty":63,"description":67},"\u002Fterms\u002Fe\u002Fexploit","An exploit is the actual tool or technique used to take advantage of a vulnerability.",{"title":51,"path":69,"acronym":6,"category":70,"difficulty":63,"description":71},"\u002Fterms\u002Fp\u002Fpatch","general","A patch is a small update that fixes something specific without replacing the whole program.",{"title":53,"path":73,"acronym":6,"category":40,"difficulty":42,"description":74},"\u002Fterms\u002Fp\u002Fpenetration-testing","Penetration testing (pentesting) is hiring ethical hackers to try to break into your own systems before the real bad guys do.",{"title":49,"path":76,"acronym":6,"category":40,"difficulty":63,"description":77},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",1776518323959]