🔥 Trending CVEs - Last 30 Days
1,261 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This SQL injection vulnerability in Tumeva News Software allows attackers to execute arbitrary SQL commands on the database. All users running affecte...
📅 18 days ago • Feb 17, 2026An authentication bypass vulnerability in Ivanti Endpoint Manager allows remote unauthenticated attackers to access stored credential data. This affec...
📅 25 days ago • Feb 10, 2026This reflected XSS vulnerability in Zirve Information Technologies' e-Taxpayer Accounting Website allows attackers to inject malicious scripts into we...
📅 26 days ago • Feb 9, 2026Calibre e-book manager versions before 9.2.0 contain a path traversal vulnerability in the CHM reader that allows attackers to write arbitrary files a...
📅 29 days ago • Feb 6, 2026This SSRF vulnerability in Pydantic AI allows attackers to make the server request internal network resources when applications accept message history...
📅 29 days ago • Feb 6, 2026This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Plane project management software. Attackers with workspace ADMIN privileges ...
⚡ Yesterday • Mar 6, 2026CVE-2026-28442 allows authenticated users to delete critical system files in ZimaOS by manipulating API requests, bypassing frontend restrictions. Thi...
📅 2 days ago • Mar 5, 2026This vulnerability allows attackers to bypass frontend restrictions and create files or directories in sensitive system locations like /etc and /usr v...
📅 5 days ago • Mar 2, 2026This vulnerability in Valkey allows malicious users to inject arbitrary data into response streams via scripting commands, potentially corrupting or t...
📅 12 days ago • Feb 23, 2026This SQL injection vulnerability in the Quiz And Survey Master WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It...
📅 15 days ago • Feb 20, 2026This Server-Side Request Forgery (SSRF) vulnerability in SillyTavern allows authenticated users to make arbitrary HTTP requests from the server and re...
📅 16 days ago • Feb 19, 2026This vulnerability in Qdrant vector database allows attackers with read-only access to append arbitrary content to files on the server via the /logger...
📅 29 days ago • Feb 6, 2026CVE-2026-21882 is a local privilege escalation vulnerability in theshit command-line utility that allows attackers to gain root privileges by exploiti...
📅 5 days ago • Mar 2, 2026This vulnerability allows DAG authors with existing permissions to manipulate Airflow's database to execute arbitrary code in the web-server context w...
📅 11 days ago • Feb 24, 2026This CVE describes a command injection vulnerability in the systeminformation Node.js library's wifiNetworks() function. Attackers can execute arbitra...
📅 16 days ago • Feb 19, 2026This critical vulnerability allows attackers with admin privileges to inject and execute arbitrary template code in server-side templates due to a vul...
📅 16 days ago • Feb 19, 2026Saturn Remote Mouse Server has a critical command injection vulnerability that allows unauthenticated attackers on the local network to execute arbitr...
📅 17 days ago • Feb 18, 2026Control Center PRO 6.2.9 contains a stack-based buffer overflow vulnerability in the user creation module's username field. Attackers can exploit this...
📅 17 days ago • Feb 18, 2026CVE-2020-37167 is a critical vulnerability in ClamAV's bytecode interpreter that allows attackers to manipulate function names through weak input vali...
📅 23 days ago • Feb 12, 2026CVE-2019-25336 is a local buffer overflow vulnerability in SpotAuditor's Base64 Encrypted Password tool that allows attackers to execute arbitrary cod...
📅 23 days ago • Feb 12, 2026CVE-2019-25332 is a local stack overflow vulnerability in FTP Commander Pro that allows attackers to execute arbitrary code by overwriting the EIP reg...
📅 23 days ago • Feb 12, 2026OpenClaw personal AI assistant versions before 2026.1.20 contain a command injection vulnerability. Unauthenticated local clients can exploit the Gate...
📅 29 days ago • Feb 6, 2026This CVE describes an out-of-bounds write vulnerability in Huawei camera modules that could allow attackers to crash affected systems. The vulnerabili...
📅 29 days ago • Feb 6, 2026This CVE describes a use-after-free concurrency vulnerability in the graphics module that could allow an attacker to cause system instability or crash...
📅 29 days ago • Feb 6, 2026OpenClaw versions before 2026.2.14 contain a server-side request forgery vulnerability in the Tlon Urbit extension. Attackers who can influence the co...
📅 2 days ago • Mar 5, 2026This vulnerability allows managers in Vaultwarden to escalate their privileges by modifying permissions for collections they shouldn't have access to....
📅 3 days ago • Mar 4, 2026A stored cross-site scripting (XSS) vulnerability in Chamilo LMS allows teachers to inject malicious JavaScript into the glossary function, which exec...
📅 5 days ago • Mar 2, 2026This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the search report option in ManageEngine ADSelfService Plu...
📅 12 days ago • Feb 23, 2026The eBay API MCP Server is vulnerable to environment variable injection through the updateEnvFile function, which doesn't validate input for newlines ...
📅 15 days ago • Feb 21, 2026This vulnerability in PanCafe Pro allows attackers to flood the system by exploiting cleartext transmission of sensitive information, potentially caus...
📅 24 days ago • Feb 11, 2026This CVE describes a Cross-Site Scripting (XSS) vulnerability in Saastech Cleaning and Internet Services Inc.'s TemizlikYolda software. Attackers can ...
📅 24 days ago • Feb 11, 2026This vulnerability in ZITADEL's login interface allows users to bypass configured security policies and self-register accounts or use password authent...
🔥 Today • Mar 7, 2026A path traversal vulnerability in Zarf's archive extraction allows malicious packages to create symlinks pointing outside the destination directory, e...
⚡ Yesterday • Mar 6, 2026OOP CMS BLOG 1.0 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries through search,...
⚡ Yesterday • Mar 6, 2026CVE-2018-25196 is an SQL injection vulnerability in ServerZilla 1.0 that allows unauthenticated attackers to manipulate database queries through the e...
⚡ Yesterday • Mar 6, 2026CVE-2018-25187 allows unauthenticated attackers to directly download the kim.db database file containing user credentials and password hashes, and exe...
⚡ Yesterday • Mar 6, 2026CVE-2018-25189 is an SQL injection vulnerability in Data Center Audit 2.6.2 that allows unauthenticated attackers to execute arbitrary SQL queries thr...
⚡ Yesterday • Mar 6, 2026CVE-2018-25182 is an SQL injection vulnerability in Silurus Classifieds Script 2.0 that allows unauthenticated attackers to execute arbitrary SQL quer...
⚡ Yesterday • Mar 6, 2026CVE-2018-25175 is an SQL injection vulnerability in Alienor Web Libre 2.0 that allows unauthenticated attackers to execute arbitrary SQL queries throu...
⚡ Yesterday • Mar 6, 2026CVE-2018-25171 is an unauthenticated SQL injection vulnerability in EdTv 2 that allows attackers to execute arbitrary SQL queries through the 'id' par...
⚡ Yesterday • Mar 6, 2026Rmedia SMS 1.0 contains an unauthenticated SQL injection vulnerability in the editgrp.php endpoint. Attackers can extract database schema information ...
⚡ Yesterday • Mar 6, 2026CVE-2018-25167 is an SQL injection vulnerability in Net-Billetterie 2.9 that allows unauthenticated attackers to execute arbitrary SQL queries through...
⚡ Yesterday • Mar 6, 2026CVE-2018-25163 is an SQL injection vulnerability in BitZoom 1.0 that allows unauthenticated attackers to execute arbitrary SQL queries through the rol...
⚡ Yesterday • Mar 6, 2026Warranty Tracking System 11.06.3 contains an SQL injection vulnerability in SearchCustomer.php that allows attackers to execute arbitrary SQL queries ...
⚡ Yesterday • Mar 6, 2026This vulnerability in OneUptime allows attackers to bypass two-factor authentication by replaying stolen WebAuthn assertions. The flaw occurs because ...
⚡ Yesterday • Mar 6, 2026Ashop Shopping Cart Software contains an unauthenticated SQL injection vulnerability in the 'shop' parameter of index.php. Attackers can extract sensi...
📅 3 days ago • Mar 4, 2026Simple Job Script contains an unauthenticated SQL injection vulnerability in the landing_location parameter of the searched endpoint. Attackers can se...
📅 3 days ago • Mar 4, 2026Simple Job Script contains an unauthenticated SQL injection vulnerability in the register-recruiters endpoint via the employerid parameter. Attackers ...
📅 3 days ago • Mar 4, 2026CVE-2026-28562 is an unauthenticated SQL injection vulnerability in wpForo WordPress plugin versions 2.4.14 and earlier. Attackers can exploit the wpf...
📅 7 days ago • Feb 28, 2026This vulnerability in Hono framework versions 4.12.0-4.12.1 allows attackers to bypass IP-based access controls when using the AWS Lambda adapter behi...
📅 10 days ago • Feb 25, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats