Cybersecurity researchers have recently published proof-of-concept (POC) exploits, which are often classified by the type of vulnerability they exploit, whether they are local or remote, and the result of the exploit (such as EOP, DOS, or Spulping). One scheme that facilitates the exploitation of zero-day vulnerabilities is known as Exploit-As-A-Service.
/Reports, release notes, official announcements.