Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover.
MITRE. (n.d.). Common Weakness Enumeration (CWE).