Navigating the Vulnerability Maze: Understanding CVE, CWE, a