CompTIA PenTest+ PT0-002 Practice Question
During a security audit of an application stack, you notice the application is utilizing an outdated open source component known for its critical vulnerabilities that have been patched in subsequent releases. Exploiting these vulnerabilities could lead attackers to compromise the hosting server. Which type of vulnerability does this scenario BEST describe?
Patching fragmentation
Dependency vulnerabilities
Race conditions
System misconfigurations