Many malicious entities have been exploiting zero-day vulnerabilities as it is a logical way of unleashing an attack. Initiating an attack through zero-day exploit, then spreading the attack and infecting numerous other systems is the way typical attacks take place.