Access to vulnerability processes in software, hardware, or online services