Recently, attackers have been targeting a critical vulnerability that allows them to bypass authentication in the inter-meter screens of Sonicwall. The exploitation of this vulnerability began soon after Proof of Concept (POC) was published.
Exploits are typically classified based on the type of vulnerability they exploit, whether they are local or remote, and the outcome of the exploit (such as EOP, DOS, Spulping). One common method for exploiting zero-day vulnerabilities is through Exploit-As-A-Service.
/Reports, release notes, official announcements.