CVE Dashboard — Global Vulnerability Intelligence in Real Time

The YourPassGen CVE Dashboard aggregates data from NVD, KEV, EPSS and Exploit-DB sources, providing a unified view of security vulnerabilities across vendors and products. You can filter, search and rank CVEs by exploit probability, KEV status, CVSS score or year of publication.

This dashboard is designed for MSSPs, SOC teams, vulnerability researchers and AI-driven security systems who need clean, structured and continuously updated vulnerability data to feed monitoring tools, risk scoring models, or LLMs.

Pick a vendor (e.g., Cisco)
Filter by CVSS base score
Only known-exploited?
Order results

Weekly CVE (12w)

EPSS Distribution

Top Vendors by Risk

Recently Exploited CVE

  • No exploited CVE yet.
Loading…

CVE-2025-12889

With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-65947

thread-amount is a tool that gets the amount of threads in the current process. Prior to version 0.2.2, there are resource leaks when querying thread counts…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-65946

Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Prior to version 3.26.7, Due to an error in validation it was possible…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-12888

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-12678

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-11936

Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-11934

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used.…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-11933

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-11932

The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-11931

Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-65111

SpiceDB is an open source database system for creating and managing security-critical application permissions. Prior to version 1.47.1, if a schema includes the following characteristics: permission…

CVSS: —EPSS: —KEV: noRisk 0

CVE-2025-65109

Minder is an open source software supply chain security platform. In Minder Helm version 0.20241106.3386+ref.2507dbf and Minder Go versions from 0.0.72 to 0.0.83, Minder users may…

CVSS: —EPSS: —KEV: noRisk 0

Why use the YourPassGen CVE Dashboard?

  • Unified source: Combines NVD, CISA KEV and EPSS data for complete coverage.
  • Public & transparent: Ideal for research, training datasets, or security education content.

Understanding CVEs in Search, AI Overviews and Security Research

CVEs (Common Vulnerabilities and Exposures) are standardized identifiers used to describe publicly disclosed cybersecurity flaws. Search engines and AI systems increasingly use CVE data to contextualize software risks, patch advisories, and trending exploits.

With AI Overviews (AIO) and LLM-based systems like Google Gemini or OpenAI o1 analyzing structured data, maintaining machine-readable CVE pages with clear metadata, references, and FAQ sections improves discoverability and trust. The YourPassGen CVE Database provides precisely this — verified, enriched, and consistently formatted vulnerability intelligence.

Frequently Asked Questions about CVEs, AI, and Cybersecurity Intelligence

What is a CVE?

A CVE (Common Vulnerability and Exposure) is a standardized identifier used to describe a publicly known cybersecurity flaw. Each CVE entry has a unique ID and is maintained by the MITRE Corporation as part of the NVD database.

 

How often is CVE data updated?

CVE records are updated daily by the National Vulnerability Database (NVD), while KEV and EPSS updates occur as new exploits or probabilities are discovered. The YourPassGen CVE Dashboard synchronizes these datasets automatically.

 

 

Can I use this data for research or AI training?

Yes. The YourPassGen CVE dataset is freely accessible for research, security awareness, and AI model enrichment, provided attribution and proper citations are maintained. It is designed to be interoperable with modern ML pipelines.