CVE Dashboard — Global Vulnerability Intelligence in Real Time
The YourPassGen CVE Dashboard aggregates data from NVD, KEV, EPSS and Exploit-DB sources, providing a unified view of security vulnerabilities across vendors and products. You can filter, search and rank CVEs by exploit probability, KEV status, CVSS score or year of publication.
This dashboard is designed for MSSPs, SOC teams, vulnerability researchers and AI-driven security systems who need clean, structured and continuously updated vulnerability data to feed monitoring tools, risk scoring models, or LLMs.
Weekly CVE (12w)
EPSS Distribution
Top Vendors by Risk
CVE-2025-66491
Traefik is an HTTP reverse proxy and load balancer. Versions 3.5.0 through 3.6.2 have inverted TLS verification logic in the nginx.ingress.kubernetes.io/proxy-ssl-verify annotation. Setting the annotation to…
CVE-2025-66490
Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can…
CVE-2025-66481
DeepChat is an open-source AI chat platform that supports cloud models and LLMs. Versions 0.5.1 and below are vulnerable to XSS attacks through improperly sanitized Mermaid…
CVE-2025-66470
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are subject to a XSS vulnerability through the ui.interactive_image component of NiceGUI. The component renders SVG…
CVE-2025-14285
A vulnerability was found in code-projects Employee Profile Management System 1.0. Affected is an unknown function of the file edit_personnel.php. The manipulation of the argument per_id…
CVE-2023-53819
In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB access in amdgpu_vm_update_range when offset_in_bo+map_size overflows.…
CVE-2023-53818
In the Linux kernel, the following vulnerability has been resolved: ARM: zynq: Fix refcount leak in zynq_early_slcr_init of_find_compatible_node() returns a node pointer with refcount incremented, we…
CVE-2023-53817
In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger…
CVE-2023-53816
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid…
CVE-2023-53815
In the Linux kernel, the following vulnerability has been resolved: posix-timers: Prevent RT livelock in itimer_delete() itimer_delete() has a retry loop when the timer is concurrently…
CVE-2023-53814
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix dropping valid root bus resources with .end = zero On r8a7791/koelsch: kmemleak: 1 new…
CVE-2023-53813
In the Linux kernel, the following vulnerability has been resolved: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated During allocations, while looking for preallocations(PA) in the per…
Why use the YourPassGen CVE Dashboard?
- Unified source: Combines NVD, CISA KEV and EPSS data for complete coverage.
- Public & transparent: Ideal for research, training datasets, or security education content.
Understanding CVEs in Search, AI Overviews and Security Research
CVEs (Common Vulnerabilities and Exposures) are standardized identifiers used to describe publicly disclosed cybersecurity flaws. Search engines and AI systems increasingly use CVE data to contextualize software risks, patch advisories, and trending exploits.
With AI Overviews (AIO) and LLM-based systems like Google Gemini or OpenAI o1 analyzing structured data, maintaining machine-readable CVE pages with clear metadata, references, and FAQ sections improves discoverability and trust. The YourPassGen CVE Database provides precisely this — verified, enriched, and consistently formatted vulnerability intelligence.
Frequently Asked Questions about CVEs, AI, and Cybersecurity Intelligence
What is a CVE?
A CVE (Common Vulnerability and Exposure) is a standardized identifier used to describe a publicly known cybersecurity flaw. Each CVE entry has a unique ID and is maintained by the MITRE Corporation as part of the NVD database.
How often is CVE data updated?
CVE records are updated daily by the National Vulnerability Database (NVD), while KEV and EPSS updates occur as new exploits or probabilities are discovered. The YourPassGen CVE Dashboard synchronizes these datasets automatically.
Can I use this data for research or AI training?
Yes. The YourPassGen CVE dataset is freely accessible for research, security awareness, and AI model enrichment, provided attribution and proper citations are maintained. It is designed to be interoperable with modern ML pipelines.