{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/zero-day-vulnerability","result":{"data":{"contentfulDictionaryTerm":{"title":"Zero-day vulnerability","slug":"zero-day-vulnerability","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"A zero-day vulnerability is a major security flaw that can leave your business exposed. Learn how to find and fix them before they cause damage."}},"body":{"body":"# Zero-Day Vulnerability \nA bug or vulnerability that is either unknown to or not yet fixed by the software vendors. These vulnerabilities leave an open hole for cybercriminals to exploit until the user has installed a patch issued by the software vendor to close the hole.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"zero-day-vulnerability","style":"position:relative;"},"children":[{"type":"text","value":"Zero-Day Vulnerability"},{"type":"element","tagName":"a","properties":{"href":"#zero-day-vulnerability","ariaLabel":"zero day vulnerability permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"A bug or vulnerability that is either unknown to or not yet fixed by the software vendors. These vulnerabilities leave an open hole for cybercriminals to exploit until the user has installed a patch issued by the software vendor to close the hole."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Zero-day vulnerability","slug":"zero-day-vulnerability","keepLearning":[{"title":"Zeus Game Over","slug":"zeus-game-over"},{"title":"Zip Bomb","slug":"zip-bomb"},{"title":"Zombie Computer","slug":"zombie-computer"}],"breadcrumb":{"location":"/dictionary/zero-day-vulnerability","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/zero-day-vulnerability","crumbLabel":"zero-day-vulnerability"}]}}},"staticQueryHashes":["1614255152"]}