Document status-quo of vulnerability tracking
Provide a documentation of the status quo of vulnerabilty tracking. Apart from the E2E test-case, the documentation should consist of:
-
Motivation: What is the use-case of vulnerability tracking and what was the origin. -
How does it work: What are the components involved (with links to all related/relevant projects). -
Algorithms: What algorithms do we have and what are their differences. -
Hierarchy: Why are algorithms prioritized and what is the impact of this priotization.
Edited by Julian Thome