What Is a CVE
CVE stands for Common Vulnerabilities and Exposures. It is a standardized identification system for publicly known security vulnerabilities in software and hardware. Each CVE entry is assigned a unique identifier in the format CVE-YYYY-NNNNN—for example, CVE-2021-44228 (Log4Shell).
The CVE program is managed by the MITRE Corporation and sponsored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). When a vulnerability is discovered and publicly disclosed, it is assigned a CVE ID that serves as a universal reference across security tools, advisories, databases, and patch notes.
CVE identifiers solve a fundamental coordination problem: before CVE, different vendors, scanners, and databases used their own naming conventions for the same vulnerability. A single flaw might appear under dozens of different names. CVE provides a single canonical identifier that all parties reference, enabling clear communication between development teams, security researchers, and tool vendors.
The National Vulnerability Database (NVD), maintained by NIST, enriches CVE entries with severity scores, affected product lists, and remediation guidance. Most dependency scanning tools and security advisories use CVE IDs as their primary reference.
The CVE and CVSS Scoring System
A CVE identifier names a vulnerability; the Common Vulnerability Scoring System (CVSS) measures its severity. CVSS provides a numerical score from 0.0 to 10.0, calculated from metrics describing how the vulnerability can be exploited and what impact it has.
CVSS Score Ranges
- Critical (9.0–10.0): Remote code execution, full system compromise. Example: Log4Shell (CVE-2021-44228) scored 10.0.
- High (7.0–8.9): Significant data access or service disruption. Example: Heartbleed (CVE-2014-0160) scored 7.5.
- Medium (4.0–6.9): Limited impact, requires specific conditions. Information disclosure, partial denial of service.
- Low (0.1–3.9): Minimal impact, difficult to exploit. Minor information leaks.
CVSS Base Metrics
The base score is derived from two groups:
- Exploitability metrics: Attack vector (network, adjacent, local, physical), attack complexity (low, high), privileges required, and user interaction
- Impact metrics: Confidentiality, integrity, and availability impact (none, low, high)
A network-accessible vulnerability requiring no privileges, no user interaction, and causing full confidentiality/integrity/availability impact receives the maximum score of 10.0.
How Developers Use CVEs
Developers interact with CVEs primarily through dependency management. When a library in your project has a known CVE, the vulnerability exists in your application by inclusion. The development workflow for CVEs involves three stages:
Discovery
Dependency scanners (npm audit, pip-audit, Snyk, Dependabot) check your dependency tree against CVE databases and flag affected versions. SBOM (Software Bill of Materials) documents list all components for CVE cross-referencing.
Prioritization
Not every CVE requires immediate action. Teams prioritize based on CVSS score, whether the vulnerable code path is reachable in their application, and whether an exploit is publicly available. A Critical CVE in a dependency you import but never call is lower priority than a High CVE in a function you use directly.
Remediation
The fix is typically upgrading to a patched version. When no patch exists, teams evaluate workarounds, alternative libraries, or compensating controls. CVE entries link to vendor advisories that describe fixed versions and mitigation steps.
How CodeSlick Maps to CVE and CWE
CodeSlick maps every finding to its corresponding CWE (Common Weakness Enumeration) identifier, linking the code-level weakness to the broader CVE ecosystem. While CVEs identify specific vulnerabilities in specific products, CWEs classify the underlying weakness types that cause those vulnerabilities.
- 294 security checks across JavaScript, TypeScript, Python, Java, and Go, each mapped to its CWE classification
- CVSS 3.1 severity scoring (range 3.1–9.8) on all findings, matching the same scoring system used by the NVD
- Dependency scanning that checks npm, pip, Maven, and Go module dependencies against known CVE databases
- Malicious package detection covering 66 known malicious packages with OSV.dev integration
This mapping means every CodeSlick finding connects directly to the standards used by security teams, auditors, and compliance frameworks worldwide.
Scan your code and dependencies for known CVEs in under 3 seconds.