9 – Using Components with Known Vulnerabilities