I. Introduction
Distribution of vulnerability severity has grown overtime, even more so since 2016
https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-distribution-over-time
. In 2021 alone, over 40,000 vulnerabilities were recorded in the Common Vulnerabilities and Exposures (CVE) databasehttps://cve.mitre.org/index.html
, Software vulnerabilities are neither limited to open-source or proprietary software nor devices or services. Vulnerabilities can have a multitude of consequences such as system exploitation which may lead to data leaks involving sensitive data including personal identifi-able information or intellectual property.