Understanding Zero-day Exploits: Protect Your Systems Now