<Ul> <Li> t: The vulnerability is discovered (by anyone). </Li> <Li> t: A security patch is published (e.g., by the software vendor). </Li> <Li> t: An exploit becomes active . </Li> <Li> t: Most vulnerable systems have applied the patch . </Li> </Ul> <Li> t: The vulnerability is discovered (by anyone). </Li> <Li> t: A security patch is published (e.g., by the software vendor). </Li> <Li> t: An exploit becomes active . </Li>

What did the zero day to the eight