“…The research community has shown many different uses for OSINT, from its collection and processing [25,28,35,40,43,48,54,59], vulnerability life cycle analysis [27,30,42,50,56], to evaluating vulnerability exploitability [23,30,31,37,45]. There are two predominant OSINT sources in the literature: NVD (e.g., [23, 30, 31, 37, 42, 45, 47, 49-51, 55, 56]), and Twitter (e.g., [25, 32, 35, 37, 39-41, 43, 44, 48, 51, 53, 55, 58, 59]).…”