GlyphSignal

Zero-day vulnerability

Unfixed software vulnerability

2 min read

Why this is trending

Interest in “Zero-day vulnerability” spiked on Wikipedia on 2026-02-25.

Categorised under Technology, this article fits a familiar pattern. wt.cat.technology.2

GlyphSignal tracks these patterns daily, turning raw Wikipedia traffic data into a curated feed of what the world is curious about. Every spike tells a story.

2026-01-27Peak: 1,2532026-02-25
30-day total: 18,735

Key Takeaways

  • A zero-day (also known as a 0-day ) is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it.
  • The term "zero-day" originally referred to the number of days since a new piece of software was released to the public, so "zero-day software" was obtained by hacking into a developer's computer before release.
  • Vendors who discover the vulnerability may create patches or advise workarounds to mitigate it, though users need to deploy that mitigation to eliminate the vulnerability in their systems.
  • Definition Despite developers' goal of delivering a product that works entirely as intended, virtually all products contain software and hardware bugs.
  • Vulnerabilities vary in their ability to be exploited by malicious actors.

A zero-day (also known as a 0-day) is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack.

The term "zero-day" originally referred to the number of days since a new piece of software was released to the public, so "zero-day software" was obtained by hacking into a developer's computer before release. Eventually the term was applied to the vulnerabilities that allowed this hacking, and to the number of days that the vendor has had to fix them. Vendors who discover the vulnerability may create patches or advise workarounds to mitigate it, though users need to deploy that mitigation to eliminate the vulnerability in their systems. Zero-day attacks are severe threats.

Definition

Despite developers' goal of delivering a product that works entirely as intended, virtually all products contain software and hardware bugs. If a bug creates a security risk, it is called a vulnerability. Vulnerabilities vary in their ability to be exploited by malicious actors. Some are not usable at all, while others can be used to disrupt the device with a denial of service attack. The most dangerous allow the attacker to inject and run their own code, without the user being aware of it. Although the term "zero-day" initially referred to the time since the vendor had become aware of the vulnerability, zero-day vulnerabilities can also be defined as the subset of vulnerabilities for which no patch or other fix is available. A zero-day exploit is any exploit that takes advantage of such a vulnerability.

Read full article on Wikipedia →

Content sourced from Wikipedia under CC BY-SA 4.0

Share

Keep Reading

2026-02-25
3
Robert Reed Carradine was an American actor. A member of the Carradine family, he made his first app…
395,060 views
4
.xxx is a sponsored top-level domain (sTLD) intended as a voluntary option for pornographic sites on…
319,247 views
6
Martin Hayter Short is a Canadian comedian, actor and writer. Short is known as an energetic comedia…
210,595 views
7
Nemesio Rubén Oseguera Cervantes, commonly referred to by his alias El Mencho, was a Mexican drug lo…
210,060 views
8
Alysa Liu is an American figure skater. She is the 2026 Winter Olympic champion in both women's sing…
171,867 views
9
Erotic photography is a style of art photography of an erotic, sexually suggestive or sexually provo…
167,704 views
Continue reading: