You are a super 1337 hacker who just discovered a vulnerability in an operating system. You do some research and find nothing online regarding this exploit and believe you are the first to find it. What option would be the correct classification of this vulnerability?
Spoof
North/South
Zero day
Denial of Service
Brute force
East/West