Zero-Day Exploits Explained | How Hackers Use Unknown Vulnerabilities