Link Search Menu Expand Document

Using Components with Known Vulnerabilities

If the target application uses components with known vulnerabilities, it is very easy for an attacker to exploit this. It takes much less energy to look for vulnerable components (like libraries and frameworks) than to start digging through the application to find an exploit of one’s own.

There are multiple tools to scan an application for common flaws, and many of them can be classified as using components with known vulnerabilities. These tools can for example check for different types of security related headers. One such tool is, which checks the given website for what security-related headers it uses. Another tool is Nikto, which is an open source web server scanner that comes with Kali Linux.[1]


[1] Borso, Serge. (2019). The Penetration Tester’s Guide to Web Applications (Artech House information security and privacy series). Norwood: Artech House.

Division of Network and Systems Engineering | KTH