How to Gain Access to the Vulnerability Database?