One-day, n-day, and zero-day vulnerabilities explained

One-day, n-day, and zero-day vulnerabilities explained