I know that for the most part, there are some small differences between thoughts on a lot of matters in terms of definitions in security.
What I am asking about is whether exploits are considered to take advantage of a specific vulnerability, or whether it is OK to say that multiple exploits take advantage of a single vulnerability. For example, we know that SQL has many types of exploits through SQL injection attacks. Do we say that the vulnerability in SQL to being manipulated through being sent unexpected commands is the vulnerability itself, or is it the specific command which is able to perform the exploit action which is the vulnerability, meaning it is a 1:1 rather than a 1:* relationship?