🔥 Trending CVEs - Last 90 Days
4,680 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This SQL injection vulnerability in the WooCommerce Orders & Customers Exporter plugin allows attackers to execute arbitrary SQL commands on WordPress...
📅 58 days ago • Jan 8, 2026CVE-2025-14360 is a missing authorization vulnerability in the Kaira Blockons WordPress plugin that allows attackers to access functionality not prope...
📅 58 days ago • Jan 8, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the ThemeMove AeroLand WordPress theme. Attackers ...
📅 58 days ago • Jan 8, 2026This CVE describes a PHP Local File Inclusion vulnerability in the Brook WordPress theme that allows attackers to include arbitrary local files via im...
📅 58 days ago • Jan 8, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 58 days ago • Jan 8, 2026This CVE describes a PHP Local File Inclusion vulnerability in the OchaHouse WordPress theme that allows attackers to include arbitrary local files th...
📅 58 days ago • Jan 8, 2026This CVE describes a missing authorization vulnerability in the REHub Framework WordPress plugin that allows attackers to access functionality not pro...
📅 58 days ago • Jan 8, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 58 days ago • Jan 8, 2026This CVE describes a PHP Local File Inclusion vulnerability in the Rozy - Flower Shop WordPress theme. Attackers can include arbitrary local files via...
📅 58 days ago • Jan 8, 2026ClipBucket v5 versions 5.5.2-#187 and below contain a blind SQL injection vulnerability in the comment functionality. Attackers can exploit this by in...
📅 59 days ago • Jan 8, 2026This CVE describes a critical stack-based buffer overflow vulnerability in Panda3D's egg-mkfont tool. Attackers can exploit this by supplying an exces...
📅 59 days ago • Jan 7, 2026This CVE describes a global buffer overflow vulnerability in zlib's untgz utility when processing excessively long archive names via command line. The...
📅 59 days ago • Jan 7, 2026CVE-2025-68705 is a path traversal vulnerability in RustFS's /rustfs/rpc/read_file_stream endpoint that allows attackers to read arbitrary files on th...
📅 59 days ago • Jan 7, 2026An authentication bypass vulnerability in Tarkov Data Manager allows unauthenticated attackers to gain full admin access by exploiting JavaScript prot...
📅 59 days ago • Jan 7, 2026This CVE describes a PHP object injection vulnerability in the DZS Video Gallery WordPress plugin that allows attackers to execute arbitrary code thro...
📅 59 days ago • Jan 7, 2026The Optional Email WordPress plugin contains a privilege escalation vulnerability that allows unauthenticated attackers to reset any user's password, ...
📅 59 days ago • Jan 7, 2026This CVE describes a remote command injection vulnerability in TRENDnet TEW-713RE routers. Attackers can execute arbitrary operating system commands b...
📅 60 days ago • Jan 7, 2026A critical authentication bypass vulnerability in wolfSSH's key exchange state machine allows attackers to manipulate the authentication process. This...
📅 60 days ago • Jan 6, 2026Blue Access Cobalt v02.000.195 has an authentication bypass vulnerability that allows attackers to proxy requests and access web application functiona...
📅 60 days ago • Jan 6, 2026This CVE describes a Missing Authorization vulnerability in the InWave Jobs WordPress plugin that allows attackers to bypass access controls. Attacker...
📅 60 days ago • Jan 6, 2026A vsftpd misconfiguration vulnerability in H3C wireless devices allows anonymous FTP uploads to be owned by the root user. Remote attackers can exploi...
📅 60 days ago • Jan 6, 2026This vulnerability allows unauthenticated attackers to download the core configuration file from NJHYST HY511 POE devices, extract MD5-hashed password...
📅 60 days ago • Jan 6, 2026CVE-2026-21675 is a use-after-free vulnerability in iccDEV's CIccXform::Create() function that can lead to arbitrary code execution. This affects appl...
📅 61 days ago • Jan 6, 2026This CVE describes an authentication bypass vulnerability in TECNO Mobile's Boomplayer app. Attackers can bypass authentication mechanisms due to insu...
📅 61 days ago • Jan 6, 2026The Crypt::Sodium::XS Perl module includes a vulnerable version of libsodium that mishandles elliptic curve point validation in certain custom cryptog...
📅 61 days ago • Jan 6, 2026An authentication bypass vulnerability in Nuvation Energy Multi-Stack Controller (MSC) allows attackers to access protected functionality without vali...
📅 64 days ago • Jan 2, 2026This vulnerability in Nuvation Energy Multi-Stack Controller allows the device to act as an unintended proxy or intermediary, potentially bridging net...
📅 64 days ago • Jan 2, 2026Bagisto eCommerce platforms running versions before 2.3.10 are vulnerable to server-side template injection via the type parameter. This allows attack...
📅 64 days ago • Jan 2, 2026Bagisto eCommerce platform versions before 2.3.10 are vulnerable to server-side template injection that can lead to remote code execution. When custom...
📅 64 days ago • Jan 2, 2026Bagisto eCommerce platform versions before 2.3.10 have unprotected API endpoints that remain accessible after installation. Unauthenticated attackers ...
📅 64 days ago • Jan 2, 2026An SQL injection vulnerability in Hyper Data Protector allows remote attackers to execute unauthorized SQL commands. This affects all systems running ...
📅 64 days ago • Jan 2, 2026This vulnerability in gpsd allows attackers to trigger heap-based out-of-bounds writes by sending specially crafted NMEA2000 PGN 129540 packets with e...
📅 64 days ago • Jan 2, 2026This critical vulnerability in Malware Remover allows remote attackers to bypass security protections through improper code generation control. Attack...
📅 64 days ago • Jan 2, 2026This SQL injection vulnerability in the online-movie-booking system allows attackers to execute arbitrary SQL commands through the movie_details.php e...
📅 64 days ago • Jan 2, 2026The Branda WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to reset passwords for any user account, ...
📅 64 days ago • Jan 2, 2026CVE-2025-69286 is a critical authentication bypass vulnerability in RAGFlow where API keys and beta tokens are generated using the same insecure algor...
📅 66 days ago • Dec 31, 2025A stack-based buffer overflow vulnerability in libcoap allows remote attackers to crash applications or potentially execute arbitrary code when proxy ...
📅 66 days ago • Dec 31, 2025This critical vulnerability in Ksenia Security Lares 4.0 Home Automation version 1.6 exposes the alarm system PIN in server responses after authentica...
📅 67 days ago • Dec 30, 2025Ksenia Security Lares 4.0 Home Automation version 1.6 contains hardcoded default administrative credentials. Attackers can use these weak default cred...
📅 67 days ago • Dec 30, 2025CVE-2023-53983 allows attackers to gain full administrative control of Anevia Flamingo XL/XS devices by exploiting weak default credentials. This affe...
📅 67 days ago • Dec 30, 2025CVE-2023-54327 is an authentication bypass vulnerability in Tinycontrol LAN Controller 1.58a that allows unauthenticated attackers to change administr...
📅 67 days ago • Dec 30, 2025JM-DATA ONU JF511-TV devices running version 1.0.67 have hardcoded default administrative credentials that cannot be changed. Attackers can use these ...
📅 67 days ago • Dec 30, 2025This vulnerability allows unauthenticated attackers to execute arbitrary system commands on SOUND4 IMPACT/FIRST/PULSE/Eco systems by injecting shell c...
📅 67 days ago • Dec 30, 2025This vulnerability allows unauthenticated attackers to execute arbitrary code on SOUND4 IMPACT/FIRST/PULSE/Eco systems by exploiting a path traversal ...
📅 67 days ago • Dec 30, 2025SOUND4 IMPACT/FIRST/PULSE/Eco devices versions 2.x and below contain hardcoded credentials in server binaries that cannot be changed through normal op...
📅 67 days ago • Dec 30, 2025This SQL injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems allows attackers to bypass authentication and potentially access sensitive d...
📅 67 days ago • Dec 30, 2025CVE-2022-50691 is a critical remote command execution vulnerability in MiniDVBLinux 5.4 that allows unauthenticated attackers to execute arbitrary com...
📅 67 days ago • Dec 30, 2025A heap-based memory corruption vulnerability in matio library versions up to 1.5.28 allows attackers to cause out-of-bounds reads and invalid memory f...
📅 67 days ago • Dec 30, 2025This vulnerability allows unauthenticated attackers to execute arbitrary commands remotely on affected JD Cloud NAS routers. Attackers can gain full c...
📅 67 days ago • Dec 30, 2025This vulnerability allows attackers to bypass authentication in RustFS by using a hardcoded static token that is publicly exposed in the source code. ...
📅 67 days ago • Dec 30, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats