SleepyJ8696 SleepyJ8696 31-10-2022 Computers and Technology contestada for which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?