Cybersecurity Ontology Shield Cybersecurity Ontology
Vulnerability

Using Components with Known Vulnerabilities

New Search
Definition

Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover.

ID: C035

Concept Relationships

This concept targetsService Availability
Terminology
  • Using Components with Known Vulnerabilities
    preferred
Academic References

MITRE. (n.d.). Common Weakness Enumeration (CWE).