Zero days explained: How unknown vulnerabilities become gateways for attackers