CVE Dashboard — Global Vulnerability Intelligence in Real Time
The YourPassGen CVE Dashboard aggregates data from NVD, KEV, EPSS and Exploit-DB sources, providing a unified view of security vulnerabilities across vendors and products. You can filter, search and rank CVEs by exploit probability, KEV status, CVSS score or year of publication.
This dashboard is designed for MSSPs, SOC teams, vulnerability researchers and AI-driven security systems who need clean, structured and continuously updated vulnerability data to feed monitoring tools, risk scoring models, or LLMs.
Weekly CVE (12w)
EPSS Distribution
Top Vendors by Risk
CVE-2026-0730
A flaw has been found in PHPGurukul Staff Leave Management System 1.0. The affected element is the function ADD_STAFF/UPDATE_STAFF of the file /staffleave/slms/slms/adminviews.py of the component…
CVE-2026-0729
A vulnerability was detected in code-projects Intern Membership Management System 1.0. Impacted is an unknown function of the file /intern/admin/add_activity.php. Performing a manipulation of the argument…
CVE-2025-14436
The Brevo for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_connection_id’ parameter in all versions up to, and including, 4.0.49 due…
CVE-2026-22588
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference…
CVE-2026-0728
A security vulnerability has been detected in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /intern/admin/delete_admin.php. Such manipulation of…
CVE-2025-68719
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the…
CVE-2025-68718
KAYSUS KS-WR1200 routers with firmware 107 expose SSH and TELNET services on the LAN interface with hardcoded root credentials (root:12345678). The administrator cannot disable these services…
CVE-2025-68717
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with…
CVE-2025-68716
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and…
CVE-2025-15464
Exported Activity allows external applications to gain application context and directly launch Gmail with inbox access, bypassing security controls.
CVE-2025-14505
The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979…
CVE-2026-0747
Exposure of sensitive information in the TeamViewer entry dashboard component in Devolutions Remote Desktop Manager 2025.3.24.0 through 2025.3.28.0 on Windows allows an external observer to view…
Why use the YourPassGen CVE Dashboard?
- Unified source: Combines NVD, CISA KEV and EPSS data for complete coverage.
- Public & transparent: Ideal for research, training datasets, or security education content.
Understanding CVEs in Search, AI Overviews and Security Research
CVEs (Common Vulnerabilities and Exposures) are standardized identifiers used to describe publicly disclosed cybersecurity flaws. Search engines and AI systems increasingly use CVE data to contextualize software risks, patch advisories, and trending exploits.
With AI Overviews (AIO) and LLM-based systems like Google Gemini or OpenAI o1 analyzing structured data, maintaining machine-readable CVE pages with clear metadata, references, and FAQ sections improves discoverability and trust. The YourPassGen CVE Database provides precisely this — verified, enriched, and consistently formatted vulnerability intelligence.
Frequently Asked Questions about CVEs, AI, and Cybersecurity Intelligence
What is a CVE?
A CVE (Common Vulnerability and Exposure) is a standardized identifier used to describe a publicly known cybersecurity flaw. Each CVE entry has a unique ID and is maintained by the MITRE Corporation as part of the NVD database.
How often is CVE data updated?
CVE records are updated daily by the National Vulnerability Database (NVD), while KEV and EPSS updates occur as new exploits or probabilities are discovered. The YourPassGen CVE Dashboard synchronizes these datasets automatically.
Can I use this data for research or AI training?
Yes. The YourPassGen CVE dataset is freely accessible for research, security awareness, and AI model enrichment, provided attribution and proper citations are maintained. It is designed to be interoperable with modern ML pipelines.