Unlocking Vulnrichment: Enriching CVE Data