🔥 Trending CVEs - Last 30 Days
1,220 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
CVE-2026-25991 is a Blind Server-Side Request Forgery (SSRF) vulnerability in Tandoor Recipes that allows authenticated users to make the server conne...
📅 24 days ago • Feb 13, 2026A high-privileged user in Infoblox NIOS can exploit the account creation mechanism to write arbitrary files to the system. This affects Infoblox NIOS ...
📅 25 days ago • Feb 12, 2026This CVE describes an out-of-bounds read vulnerability in macOS kernel memory that could allow an attacker to cause system crashes or read sensitive k...
📅 26 days ago • Feb 11, 2026A buffer overflow vulnerability in MUNGE authentication daemon (munged) versions 0.5 to 0.5.17 allows local attackers to leak cryptographic key materi...
📅 27 days ago • Feb 10, 2026SAP Solution Tools Plug-In (ST-PI) contains an authorization bypass vulnerability where authenticated users can access sensitive information without p...
📅 28 days ago • Feb 10, 2026This CVE describes a denial-of-service vulnerability in SAP systems where authenticated users can trigger excessive resource consumption by invoking a...
📅 28 days ago • Feb 10, 2026Cube semantic layer versions 0.27.19 through 1.5.12, 1.4.1 and earlier, and 1.0.13 and earlier contain an API token validation vulnerability that allo...
📅 28 days ago • Feb 9, 2026Ghost CMS versions 0.7.2 through 6.19.0 contain a vulnerability where malicious themes can execute arbitrary code on the server. This allows attackers...
📅 5 days ago • Mar 5, 2026Textream macOS teleprompter app versions before 1.5.1 have a WebSocket server that doesn't validate the Origin header, allowing malicious web pages to...
📅 7 days ago • Mar 2, 2026This SQL injection vulnerability in Mautic's API endpoint allows authenticated users to inject arbitrary SQL commands via the sort direction parameter...
📅 13 days ago • Feb 24, 2026This vulnerability allows attackers to inject malicious scripts via model outputs containing <script> tags in New API's MarkdownRenderer.jsx component...
📅 14 days ago • Feb 24, 2026This vulnerability allows authenticated administrators in Zscaler Internet Access (ZIA) to execute backend functions through improper input validation...
📅 14 days ago • Feb 23, 2026OpenClaw versions 2026.2.13 and below on macOS are vulnerable to OS command injection when refreshing OAuth tokens in the Keychain. This allows attack...
📅 17 days ago • Feb 21, 2026This CVE describes a missing authorization vulnerability in the AIO WP Builder WordPress plugin that allows attackers to bypass access controls. It af...
📅 17 days ago • Feb 20, 2026Fabric.js versions before 7.2.0 have an SVG export vulnerability where user-controlled JSON data isn't properly escaped when converted to SVG. This al...
📅 18 days ago • Feb 19, 2026This SQL injection vulnerability in the Bit Form WordPress plugin allows attackers to execute arbitrary SQL commands through the plugin's admin interf...
📅 19 days ago • Feb 19, 2026This vulnerability allows a malicious Mattermost server to execute arbitrary executables on a user's system when the user clicks on certain items in t...
📅 21 days ago • Feb 16, 2026OpenMetadata versions before 1.11.8 leak JSON Web Tokens (JWTs) used by the ingestion-bot service through API calls from the UI. This allows any read-...
📅 26 days ago • Feb 11, 2026A privilege escalation vulnerability in Outline document management systems allows authenticated users to gain unauthorized administrative privileges ...
📅 26 days ago • Feb 11, 2026This vulnerability allows authenticated attackers to inject malicious JavaScript into document titles in Polarion applications. When other users view ...
📅 28 days ago • Feb 10, 2026An uninitialized pointer dereference vulnerability in ImageMagick's JBIG decoder allows attackers to cause denial of service or potentially execute ar...
🔥 Today • Mar 10, 2026FreshRSS versions before 1.28.0 contain an authentication bypass vulnerability in master token logic. When anonymous viewing is enabled, attackers can...
🔥 Today • Mar 9, 2026This vulnerability in nr modem allows remote attackers to cause a system crash through improper input validation, leading to denial of service without...
⚡ Yesterday • Mar 9, 2026This vulnerability in nr modem software allows remote attackers to cause a system crash through improper input validation, leading to denial of servic...
⚡ Yesterday • Mar 9, 2026This vulnerability in nr modem allows remote attackers to cause a system crash through improper input validation, leading to denial of service. It aff...
⚡ Yesterday • Mar 9, 2026An unauthenticated remote attacker can steal valid session tokens from UBR devices because tokens are exposed in plaintext within URL parameters of th...
⚡ Yesterday • Mar 9, 2026This vulnerability in nr modem allows remote attackers to cause a system crash through improper input validation, leading to denial of service without...
⚡ Yesterday • Mar 9, 2026Ghost CMS versions 5.101.6 through 6.19.2 have incomplete CSRF protections in the session verification endpoint, allowing attackers to use one-time co...
📅 2 days ago • Mar 7, 2026A vulnerability in express-rate-limit middleware versions 8.0.0 through 8.3.0 causes all IPv4 clients to share the same rate-limit bucket when using I...
📅 3 days ago • Mar 7, 2026The JS Archive List WordPress plugin is vulnerable to PHP object injection through the 'included' shortcode attribute. Authenticated attackers with Co...
📅 3 days ago • Mar 7, 2026This SQL injection vulnerability in the WordPress ZIP Code Based Content Protection plugin allows unauthenticated attackers to inject malicious SQL qu...
📅 3 days ago • Mar 7, 2026This vulnerability allows attackers to bypass route-based middleware protections in @hono/node-server applications by using URL-encoded slashes (%2F) ...
📅 3 days ago • Mar 6, 2026This vulnerability allows attackers to bypass rate limiting on WebSocket authentication requests, enabling denial-of-service attacks that disrupt legi...
📅 3 days ago • Mar 6, 2026A denial of service vulnerability in CoreDNS's loop detection plugin allows attackers to crash DNS servers by sending specially crafted DNS queries. T...
📅 3 days ago • Mar 6, 2026An absolute path traversal vulnerability in Navtor NavBox allows unauthenticated remote attackers to read arbitrary files from the filesystem. This af...
📅 3 days ago • Mar 6, 2026Mongoose Web Server 6.9 contains a denial of service vulnerability where remote attackers can crash the service by establishing multiple socket connec...
📅 3 days ago • Mar 6, 2026Easyndexer 1.0 contains an unauthenticated arbitrary file download vulnerability that allows attackers to retrieve sensitive system files by manipulat...
📅 3 days ago • Mar 6, 2026AMPPS 2.7 contains a denial of service vulnerability where remote attackers can crash the service by sending malformed data to the default HTTP port. ...
📅 3 days ago • Mar 6, 2026SVGO versions 2.1.0-2.8.0, 3.0.0-3.3.2, and before 4.0.1 are vulnerable to XML entity expansion attacks. Attackers can craft small malicious SVG files...
📅 4 days ago • Mar 6, 2026This CVE describes a path traversal vulnerability in Talishar, a fan-made Flesh and Blood project, where the ParseGamestate.php component can be acces...
📅 4 days ago • Mar 6, 2026This CVE describes a WebSocket API vulnerability where missing rate limiting on authentication requests allows attackers to conduct denial-of-service ...
📅 4 days ago • Mar 6, 2026OpenClaw versions before 2026.2.15 use deprecated SHA-1 hashing for sandbox identifier cache keys, making them vulnerable to collision attacks. Attack...
📅 4 days ago • Mar 5, 2026OpenClaw versions before 2026.2.14 have a webhook routing vulnerability in the Google Chat monitor component that allows attackers to misroute webhook...
📅 4 days ago • Mar 5, 2026OpenClaw versions before 2026.2.13 contain a path traversal vulnerability in browser control API endpoints that handle trace and download files. Attac...
📅 4 days ago • Mar 5, 2026OpenClaw versions before 2026.2.2 fail to validate Telegram webhook secrets, allowing unauthenticated attackers to send forged Telegram updates. This ...
📅 4 days ago • Mar 5, 2026CVE-2026-28789 is an unauthenticated denial-of-service vulnerability in OliveTin's OAuth2 login flow. Attackers can crash the service by sending concu...
📅 4 days ago • Mar 5, 2026CVE-2026-28342 is an unauthenticated denial-of-service vulnerability in OliveTin's PasswordHash API endpoint. Attackers can send concurrent password h...
📅 4 days ago • Mar 5, 2026This vulnerability allows remote unauthenticated attackers to bypass Traefik's protection mechanisms and remove critical X-Forwarded headers that iden...
📅 4 days ago • Mar 5, 2026This vulnerability allows remote unauthenticated attackers to cause denial of service in Traefik by exploiting a TLS handshake flaw. Attackers can sen...
📅 4 days ago • Mar 5, 2026This vulnerability in Eclipse Jetty's GzipHandler causes a memory leak when processing compressed HTTP requests without compressed responses. Attacker...
📅 5 days ago • Mar 5, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats