bobbyhsu13311 bobbyhsu13311 06-02-2024 Computers and Technology contestada What is used to track and document various types of known vulnerabilities