A flaw in a piece of software or hardware that was previously unknown to the maker of the product. Until the manufacturers become aware of the flaw and fixes it, attackers can use it for their own purposes.