The vulnerability information is one of the major and most important sources of cyber threat intelligence (CTI). The currently running HPI Vulnerability Database (HPI-VDB) provides a comprehensive and up-to-date repository, which contains a large number of known vulnerabilities of Software. The textual descriptions about each vulnerability entry are grabbed from the public portals of other vulnerability databases, software vendors, security forums, etc. and then normalized into a well-structured data model. Thanks to the high-quality vulnerability data, many analytical services can be provided, including browsing, searching, self-diagnosis, Attack Graph (AG), as well as other API-based ad-hoc analytics. With the increasing demand of data-driven threat detection, it makes sense to research and implement more efficient management of vulnerability information to achieve high-quality CTI data.