VULNERABLE AND OUTDATED COMPONENTS in cybersecurity