Zero-Day Vulnerability
A zero-day is a security vulnerability that attackers are actively exploiting before the software vendor knows about it or has released a fix. The name comes from the fact that developers have had zero days to address it. Zero-days are the most dangerous class of vulnerability because there is no patch to apply — the only defenses are workarounds, network controls, or disabling affected functionality.
Zero-day vs known vulnerability
Most CVEs are not zero-days. The typical vulnerability lifecycle goes: researcher discovers the issue → privately notifies the vendor → vendor releases a patch → CVE is assigned and published. At the point of public disclosure, a patch already exists. A zero-day skips the patch step — it's being exploited before anyone has a fix ready.
Zero-days in open source dependencies
In the open source world, zero-days are particularly challenging because the source code is public — attackers can find vulnerabilities by reading the code. The Log4Shell vulnerability (CVE-2021-44228) was being actively exploited in the wild before the Apache team had a complete fix. For the first 72 hours after disclosure, there was no safe version to upgrade to.
What to do when a zero-day affects your dependencies
- Monitor the vendor's GitHub and security mailing list for patch releases
- Apply vendor-recommended workarounds immediately (e.g., JVM flags for Log4Shell)
- Consider disabling affected functionality until a patch is available
- Update to the patched version the moment it's released
Paste your manifest — get a fixed version with all CVEs patched in seconds.
Open PackageFix →Free · No signup · No CLI · Runs in your browser