According to information that recently surfaced on underground hacker forums, exploits are typically categorized and referred to by the type of vulnerability they exploit, whether they are local or remote, and the outcome of the exploit initiation (such as EOP, DOS, Spulping). One particular scheme that provides zero-day exploits is known as Exploit-A-A-Service.
/Reports, release notes, official announcements.