Software Composition Analysis

Know every vulnerable
dependency you ship

Athrv SCA scans your open-source dependencies against the NVD, surfacing CVEs with CVSS scores, affected versions, and exact upgrade paths.

595+
Total CVEs Tracked
28
Critical CVEs
7.2
Avg CVSS Score
10K+
Packages Scanned

Real CVEs from a real scan

This is a subset of what a typical Python project scan looks like — 595 findings across Flask and Jinja2 alone.

CVE IDSeverityPackageInstalledFixed InCVSSVulnerability
CVE-2018-1000656HIGHFlask0.12.20.12.37.5Denial of Service via crafted JSON file
CVE-2019-1010083HIGHFlask0.12.21.07.5Unexpected memory usage via crafted encoded JSON data
CVE-2023-30861HIGHFlask0.12.22.3.27.5Possible disclosure of permanent session cookie
CVE-2026-27205LOWFlask0.12.23.1.34.3Information disclosure via improper caching of session data
CVE-2019-10906HIGHJinja22.102.10.18.6str.format_map allows sandbox escape
CVE-2020-28493MEDIUMJinja22.102.11.35.3ReDoS vulnerability in the urlize filter
CVE-2024-22195MEDIUMJinja22.103.1.35.4HTML attribute injection when passing user input as keys to xmlattr
CVE-2024-56326MEDIUMJinja22.103.1.57.8Sandbox breakout through indirect reference to format method

Built for developers, not just security teams

Actionable output means developers can act on findings without a security expert translating them.

Core Engine
Deep Dependency Analysis

Scans your requirements.txt, package.json, pom.xml and more. Every transitive dependency is checked against the National Vulnerability Database.

Intelligence
CVE Intelligence

Every finding links to the canonical CVE entry with CVSS score, description, affected versions, and recommended fix — no tab switching required.

Remediation
Pinpoint Upgrade Paths

"Fixed In" version shown for every finding so developers know exactly which version to upgrade to, not just that something is broken.

DevOps
CI/CD Ready

Drop into any pipeline. Block merges when critical CVEs appear, and auto-comment findings on pull requests.

Prioritisation
CVSS-Based Prioritisation

Sort and filter by CVSS score so high-impact vulnerabilities surface first, not just the most recently discovered.

Reporting
Multi-Target Reports

Track findings per target file. Export structured reports for compliance audits, client reviews, or internal security dashboards.

CVSS-driven prioritisation

Every CVE is scored and classified so your team always patches the highest-impact issues first.

Critical
28

Remote code execution, authentication bypass, full data exposure.

High
188

Denial of service, sandbox escape, sensitive data leakage.

Medium
264

ReDoS, information disclosure, injection via filter functions.

Low
115

Improper caching, deprecated API usage, minor logic flaws.

From manifest to remediation

Four steps from dependency file to patched, verified code.

01
Upload Manifest

Drop in requirements.txt, package.json, pom.xml or any supported manifest. Scan triggers instantly.

02
NVD Lookup

Every package and version is cross-referenced against the National Vulnerability Database in real time.

03
Score & Classify

Findings are scored with CVSS, classified by severity, and mapped to canonical CVE identifiers.

04
Upgrade & Verify

Follow the "Fixed In" version, upgrade the dependency, and re-scan to confirm the CVE is resolved.

Stop shipping known vulnerabilities

Run your first dependency scan in under 30 seconds. Free tier, no credit card required.