“…On the limitations of vulnerability databases. As part of our systematic mapping, we could discover that only a limited set of studies employed vulnerability databases in the context of vulnerability detection (e.g., Zou et al, 2019), database comparison (e.g., Tripathi and Singh, 2011), and database quality improvement (e.g., Glanz et al, 2015). Instead, these studies preferred uncovering vulnerability data by mining other data sources (Lin et al, 2020).…”