🔥 Trending CVEs - Last 90 Days
4,472 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This critical vulnerability allows unauthenticated attackers to enable Telnet service and gain root access with blank password on Totolink X5000R rout...
📅 89 days ago • Dec 10, 2025This path traversal vulnerability in Budibase allows authenticated users with builder privileges to read arbitrary server files, including sensitive e...
🔥 Today • Mar 9, 2026This CVE describes an authentication bypass vulnerability in Huawei device authentication modules that allows attackers to bypass authentication mecha...
📅 5 days ago • Mar 5, 2026This critical vulnerability in Pebble Prism Ultra v2.9.2 allows attackers within Bluetooth range to execute arbitrary commands, intercept data, and hi...
📅 5 days ago • Mar 4, 2026This vulnerability in asbplayer v1.13.0 allows attackers to upload malicious subtitle files that can execute arbitrary code on the system. Users of as...
📅 12 days ago • Feb 25, 2026OpenS100 (S-100 viewer reference implementation) contains a remote code execution vulnerability where untrusted portrayal catalogues can execute arbit...
📅 20 days ago • Feb 17, 2026This vulnerability allows authenticated low-privileged users in SAP NetWeaver ABAP systems to execute unauthorized background Remote Function Calls, b...
📅 28 days ago • Feb 10, 2026A URL encoding vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to manipulate web pages or execute malicious scripts....
📅 29 days ago • Feb 9, 2026This vulnerability allows attackers to bypass security controls in Langroid's TableChatAgent and execute arbitrary code through the pandas_eval tool. ...
📅 33 days ago • Feb 4, 2026A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attackers to bypass authentication and gain unauthorize...
📅 34 days ago • Feb 3, 2026This CVE describes a Local File Inclusion vulnerability in the lollms-webui application that allows attackers to execute arbitrary Python code remotel...
📅 36 days ago • Feb 2, 2026CVE-2026-25130 is a critical argument injection vulnerability in the Cybersecurity AI (CAI) framework that allows remote code execution. Attackers can...
📅 38 days ago • Jan 30, 2026CVE-2026-22793 is an unsafe option parsing vulnerability in the ECharts Markdown plugin of the 5ire AI assistant that allows arbitrary JavaScript exec...
📅 47 days ago • Jan 21, 2026This vulnerability allows attackers to inject malicious HTML that executes arbitrary JavaScript in the 5ire desktop AI assistant renderer context. Thi...
📅 47 days ago • Jan 21, 2026This vulnerability allows attackers to read arbitrary files on MedDream PACS Premium servers by sending specially crafted HTTP requests to the encapsu...
📅 48 days ago • Jan 20, 2026SiYuan personal knowledge management systems before version 3.5.4 have a stored XSS vulnerability in the dynamic icon feature. Attackers can inject ma...
📅 49 days ago • Jan 19, 2026This vulnerability in the Dive MCP Host Desktop Application allows attackers to install malicious MCP server configurations via crafted deeplinks with...
📅 52 days ago • Jan 16, 2026CVE-2025-12543 is a critical vulnerability in Undertow HTTP server core where improper Host header validation allows attackers to poison caches, perfo...
📅 61 days ago • Jan 7, 2026This vulnerability allows remote command execution as root on Coolify instances when users create applications from malicious repositories using the d...
📅 63 days ago • Jan 5, 2026A Cross-Site Request Forgery (CSRF) vulnerability in the ConoHa by GMO WING WordPress Migrator plugin allows attackers to trick authenticated administ...
📅 69 days ago • Dec 30, 2025This CVE describes a remote code execution vulnerability in the 5ire AI assistant desktop application. The vulnerability allows attackers to execute a...
📅 76 days ago • Dec 23, 2025This CVE describes an iframe injection vulnerability in MyNET v.26.06 and earlier that allows remote attackers to execute arbitrary code via the src p...
📅 77 days ago • Dec 22, 2025This critical vulnerability in Frappe Framework's Attachments module allows attackers to upload malicious XML files that can lead to remote code execu...
📅 77 days ago • Dec 22, 2025ChurchCRM versions before 6.5.3 contain a SQL injection vulnerability in the Event Attendee Editor that allows authenticated users to execute arbitrar...
📅 82 days ago • Dec 17, 2025A Cross-Site Scripting (XSS) vulnerability in DriveLock Operations Center versions 25.1.2 through 25.1.4 allows attackers to inject malicious scripts ...
📅 82 days ago • Dec 17, 2025DeepChat versions before 0.5.3 contain a critical vulnerability where unsafe Mermaid diagram rendering allows arbitrary JavaScript execution. This XSS...
📅 84 days ago • Dec 16, 2025CVE-2025-67511 is a command injection vulnerability in Cybersecurity AI (CAI) framework versions 0.5.9 and below. Attackers can inject malicious comma...
📅 89 days ago • Dec 11, 2025This vulnerability allows unauthenticated attackers to impersonate legitimate charging stations by connecting to WebSocket endpoints without proper au...
📅 3 days ago • Mar 6, 2026This CVE describes a critical authentication bypass vulnerability in WebSocket endpoints used for OCPP (Open Charge Point Protocol) communication. Att...
📅 3 days ago • Mar 6, 2026This vulnerability allows unauthenticated attackers to impersonate legitimate charging stations by connecting to WebSocket endpoints without proper au...
📅 4 days ago • Mar 6, 2026This vulnerability in Zephyr RTOS's DNS resolver allows an out-of-bounds write when processing malicious DNS responses. Attackers can exploit this to ...
📅 5 days ago • Mar 5, 2026CVE-2026-26980 is an SQL injection vulnerability in Ghost CMS that allows unauthenticated attackers to read arbitrary data from the database. This aff...
📅 18 days ago • Feb 20, 2026This is a reflected cross-site scripting (XSS) vulnerability in Turboard software that allows attackers to inject malicious scripts into web pages. Us...
📅 26 days ago • Feb 11, 2026Fiber web framework versions before 2.52.11 on Go versions prior to 1.24 may generate predictable UUIDs when crypto/rand fails to obtain secure random...
📅 28 days ago • Feb 9, 2026Keylime versions 7.12.0 and later have a critical authentication bypass vulnerability where the registrar fails to enforce client-side TLS certificate...
📅 31 days ago • Feb 6, 2026The Aptsys POS Platform Web Services module exposes internal API testing tools to unauthenticated users, allowing attackers to discover and execute cr...
📅 45 days ago • Jan 23, 2026This SQL injection vulnerability in the Aptsys gemscms POS Platform allows attackers to execute arbitrary SQL commands by manipulating the id paramete...
📅 45 days ago • Jan 23, 2026This vulnerability allows attackers to perform brute force attacks against user accounts and exploit weak password recovery mechanisms in Birebirsoft ...
📅 45 days ago • Jan 23, 2026This vulnerability allows unauthenticated attackers to establish WebSocket connections to affected systems, bypassing authentication entirely. Attacke...
📅 46 days ago • Jan 22, 2026A missing authorization vulnerability in the Order Listener for WooCommerce plugin allows attackers to bypass access controls and perform unauthorized...
📅 46 days ago • Jan 22, 2026This vulnerability allows unauthenticated attackers to execute unpublished edit-mode actions in publicly accessible Appsmith applications. Attackers c...
📅 47 days ago • Jan 22, 2026An authentication bypass vulnerability in Mitel MiVoice MX-ONE Provisioning Manager allows unauthenticated attackers to gain unauthorized access to us...
📅 53 days ago • Jan 15, 2026This vulnerability allows authentication bypass in ZimaOS by exploiting improper password validation for system service accounts. Attackers can gain a...
📅 60 days ago • Jan 8, 2026This SQL injection vulnerability in the tPlayer WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all Wo...
📅 82 days ago • Dec 18, 2025CVE-2025-67510 is a critical SQL injection vulnerability in the Neuron AI framework's MySQLWriteTool that allows arbitrary SQL execution. This enables...
📅 89 days ago • Dec 10, 2025This vulnerability allows unauthenticated attackers to access camera configuration information, including account credentials, by exploiting a specifi...
📅 89 days ago • Dec 10, 2025This vulnerability allows cross-site scripting (XSS) attacks through ZITADEL's SAML login endpoint, potentially enabling attackers to steal authentica...
📅 2 days ago • Mar 7, 2026An unauthenticated reflected XSS vulnerability in SiYuan's dynamic icon API allows attackers to inject malicious JavaScript via crafted SVG images. Wh...
📅 4 days ago • Mar 6, 2026Ghostfolio versions before 2.245.0 contain a server-side request forgery (SSRF) vulnerability in the manual asset import feature. Attackers can exploi...
📅 4 days ago • Mar 6, 2026A stored cross-site scripting (XSS) vulnerability in AliasVault Web Client allows attackers to inject malicious JavaScript into emails sent to any Ali...
📅 6 days ago • Mar 3, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats