Dashboard
The Dashboard is your central monitoring hub in CVEalert.io. It gives you a real-time overview of recent vulnerability alerts, severity trends, affected software, and industry security news.
Tip
Check the dashboard daily to catch newly disclosed critical vulnerabilities early.
Page Overview
When to use this page
- As a daily starting point for security monitoring
- When you want a high-level view of recent vulnerabilities and alerts
- When prioritizing which software or CVEs need immediate attention
- When tracking overall severity trends across your environment
What you can do
- Get a real-time overview of recent vulnerability alerts
- Identify critical and high-severity issues at a glance
- See which software products are generating the most alerts
- Monitor severity trends over time
- Stay informed about actively exploited vulnerabilities and security news
At a Glance
- Latest vulnerability alerts detected across monitored software
- Severity trends over the last 30 days
- Software generating the highest number of alerts
- Actively exploited vulnerabilities (KEV)
- Curated cybersecurity news and advisories
Warning
Vulnerabilities listed in the KEV section are actively exploited and should be treated as urgent.
Key Sections & UI Elements
Latest Alerts Panel
A list of the most recent vulnerability alerts detected by the system.
Each alert row shows:
- Severity badge (Critical, High, Medium, Low)
- CVE ID (e.g.,
CVE-2025-36936) - Vendor and product (e.g., Google: Android)
- Date detected
Action:
- View all alerts – Opens the full alerts list with filtering and details.
Severities Summary
A visual summary of vulnerability counts by severity over the last 30 days.
Columns include:
- Total – Total number of alerts
- Critical / High / Medium / Low – Count by severity level
Tip
This helps you quickly understand your overall risk exposure.
Top 5 Vulnerable Software
Shows the software products generating the most alerts in the last 30 days.
For each software item:
- Software name (e.g., Google: Android, Elastic: Kibana)
- Total alerts
- Breakdown by severity (Critical, High, Medium, Low)
Tip
Use this section to identify which systems need patching or deeper review.
The Hacker News – RSS Feed
Curated cybersecurity news and advisories.
Each entry includes:
- CVE reference or headline
- Short description of the vulnerability or exploit
- Vendor or affected product
- Date
Tip
This feed helps you stay informed about emerging threats.
Known Exploited Vulnerabilities (KEV)
A list of vulnerabilities actively exploited in the wild (based on CISA KEV catalog or similar sources).
Each entry includes:
- CVE ID
- Vulnerability description
- Vendor and product
- Date added
Tip
These vulnerabilities should be prioritized for remediation.
Note
Not all vulnerabilities affect your environment - use the Alerts and Software sections to verify relevance.
Step-by-Step Usage Guide
-
Review the Latest Alerts
- Look for Critical and High severity entries at the top.
- Click View all alerts to investigate details and remediation steps.
-
Check Severity Trends
- Review the Severities panel to understand your current risk profile.
- Focus on reducing Critical and High counts first.
-
Identify High-Risk Software
- In Top 5 Vulnerable Software, note which products appear most frequently.
- Plan updates or mitigation strategies for those systems.
-
Monitor Security News
- Scan The Hacker News feed for new exploits or advisories relevant to your stack.
-
Prioritize KEV Vulnerabilities
- Review Known Exploited Vulnerabilities and ensure patches or mitigations are applied immediately.
If something on the dashboard is unclear, it likely links to a detailed view in the Alerts or Software sections where remediation guidance and CVE metadata are available.