second-order vulnerabilities

Second-order vulnerabilities refer to weaknesses or flaws in computer systems or networks that arise as a result of exploiting other vulnerabilities. These vulnerabilities are not initially present but are created due to the actions taken to exploit an existing vulnerability.

Requires login.