🔥 Trending CVEs - Last 30 Days
1,219 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability in Hono web framework allows attackers to bypass route-based middleware protections (like authentication) for static files by using...
📅 5 days ago • Mar 4, 2026This vulnerability in cpp-httplib allows attackers to bypass configured payload size limits by sending compressed HTTP requests. When using streaming ...
📅 5 days ago • Mar 4, 2026An argument injection vulnerability in bird-lg-go's traceroute module allows remote attackers to inject arbitrary command-line flags via the q paramet...
📅 5 days ago • Mar 4, 2026This SQL injection vulnerability in the JS Help Desk WordPress plugin allows unauthenticated attackers to inject malicious SQL queries via a cookie pa...
📅 6 days ago • Mar 4, 2026This vulnerability allows unauthenticated attackers to cause CPU exhaustion denial-of-service by sending specially crafted JWE tokens with extremely h...
📅 6 days ago • Mar 3, 2026This vulnerability allows unauthenticated attackers to download arbitrary files from Weintek cMT-3072XH2 HMI devices via the download_wb.cgi component...
📅 6 days ago • Mar 3, 2026This vulnerability allows unauthenticated attackers to bypass signature verification in PKCS7 objects with Authenticated Attributes in AWS-LC. It affe...
📅 7 days ago • Mar 2, 2026A certificate validation bypass vulnerability in AWS-LC's PKCS7_verify() function allows unauthenticated attackers to bypass certificate chain verific...
📅 7 days ago • Mar 2, 2026This vulnerability in Koa.js allows attackers to inject malicious hostnames via specially crafted HTTP Host headers containing '@' symbols. Applicatio...
📅 12 days ago • Feb 26, 2026This vulnerability in minimatch allows attackers to cause denial of service by crafting glob patterns with multiple non-adjacent ** segments, causing ...
📅 12 days ago • Feb 26, 2026The WP Responsive Images WordPress plugin contains a path traversal vulnerability in the 'src' parameter that allows unauthenticated attackers to read...
📅 12 days ago • Feb 26, 2026This vulnerability in pypdf allows attackers to craft malicious PDF files that cause denial of service by exhausting system RAM when the XFA property ...
📅 12 days ago • Feb 26, 2026CVE-2026-27831 is a heap-based out-of-bounds read vulnerability in rldns DNS server version 2.3 that can cause denial of service. The vulnerability al...
📅 12 days ago • Feb 26, 2026This vulnerability allows authenticated users to achieve remote code execution by uploading a ZIP file containing a file with shell metacharacters in ...
📅 12 days ago • Feb 26, 2026TinyWeb versions before 2.02 are vulnerable to Slowloris denial-of-service attacks where attackers can exhaust server resources by opening many connec...
📅 12 days ago • Feb 26, 2026This is a use-after-free vulnerability in FreeRDP's X11 client implementation where a freed pointer is dereferenced during cleanup. An attacker could ...
📅 12 days ago • Feb 25, 2026This vulnerability in FreeRDP allows a malicious RDP server to trigger an out-of-bounds read by sending an execResult value of 7 or greater. This coul...
📅 12 days ago • Feb 25, 2026An unauthenticated attacker can cause Denial of Service on GitLab instances by sending specially crafted requests to the Jira events endpoint. This af...
📅 12 days ago • Feb 25, 2026An unauthenticated attacker can cause denial of service in GitLab by sending specially crafted files to the container registry event endpoint. This af...
📅 12 days ago • Feb 25, 2026OpenEMR versions before 8.0.0 have a session expiration bypass vulnerability. Attackers can send a specific parameter (skip_timeout_reset=1) to preven...
📅 12 days ago • Feb 25, 2026A firewall misconfiguration allows external attackers to connect to internal services through WAN port 5222, bypassing intended network segmentation. ...
📅 12 days ago • Feb 25, 2026CVE-2026-27730 is a Server-Side Request Forgery (SSRF) vulnerability in esm.sh's fetch route that allows attackers to bypass hostname-based validation...
📅 12 days ago • Feb 25, 2026The Geo Mashup WordPress plugin contains an SQL injection vulnerability in the 'sort' parameter that allows unauthenticated attackers to execute arbit...
📅 13 days ago • Feb 25, 2026The WPGSI: Spreadsheet Integration plugin for WordPress has critical REST API endpoints that lack proper authentication and authorization checks. Unau...
📅 13 days ago • Feb 25, 2026tfplan2md versions before 1.26.1 fail to properly mask sensitive values in Terraform plan reports, exposing secrets like API keys, passwords, and conf...
📅 13 days ago • Feb 25, 2026This vulnerability in Parse Dashboard's AI Agent API endpoint allows unauthenticated remote attackers to perform arbitrary read and write operations o...
📅 13 days ago • Feb 25, 2026A bug in Wasmtime's async component model implementation causes a panic when call_async futures are dropped before completion and then called again on...
📅 13 days ago • Feb 24, 2026This vulnerability in Wasmtime's WASI HTTP implementation causes denial of service when excessive HTTP headers are processed. The runtime panics inste...
📅 13 days ago • Feb 24, 2026A path traversal vulnerability in Fiber's static middleware on Windows allows remote attackers to bypass sanitization and read arbitrary files from th...
📅 13 days ago • Feb 24, 2026CVE-2026-25899 is a memory exhaustion vulnerability in GoFiber v3 web framework where a specially crafted 10-character cookie value triggers unvalidat...
📅 13 days ago • Feb 24, 2026Piwigo versions 14.x have a weak secret key generation vulnerability during installation. Attackers can brute-force the secret key in about one hour, ...
📅 13 days ago • Feb 24, 2026This vulnerability in Binardat 10G08-0800GSM network switches allows attackers to perform brute-force attacks against login credentials due to missing...
📅 13 days ago • Feb 24, 2026Binardat 10G08-0800GSM network switches expose administrative passwords in plaintext within the web interface and HTTP responses, allowing attackers t...
📅 13 days ago • Feb 24, 2026This vulnerability in Binardat 10G08-0800GSM network switches allows attackers to decrypt protected data due to the use of RC4 encryption with a hard-...
📅 13 days ago • Feb 24, 2026CVE-2026-27584 is an authentication bypass vulnerability in ActualBudget server that allows unauthenticated attackers to access sensitive bank account...
📅 13 days ago • Feb 24, 2026This vulnerability allows attackers to read uninitialized memory in Firefox and Firefox Focus for Android, potentially exposing sensitive information....
📅 13 days ago • Feb 24, 2026This vulnerability affects IEC 60870-5-104 implementations when bi-directional functionality is configured. Attackers can send specially crafted inval...
📅 13 days ago • Feb 24, 2026ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 contain a memory allocation vulnerability in SVG processing. A malicious SVG file with a crafted ...
📅 14 days ago • Feb 24, 2026A denial-of-service vulnerability in free5GC SMF allows attackers to crash the Session Management Function by sending malformed PFCP SessionReportRequ...
📅 14 days ago • Feb 24, 2026ImageMagick versions before 7.1.2-15 and 6.9.13-40 have a heap information disclosure vulnerability in their PSD format handler. When processing speci...
📅 14 days ago • Feb 24, 2026This vulnerability in ImageMagick allows attackers to cause denial of service by exploiting an infinite loop in PCD file processing. When ImageMagick ...
📅 14 days ago • Feb 24, 2026A heap-based buffer overflow vulnerability in free5GC go-upf versions before 1.2.8 allows remote attackers to cause denial of service by sending speci...
📅 14 days ago • Feb 23, 2026This vulnerability in Valkey allows attackers with access to the clusterbus port to send specially crafted packets that cause out-of-bounds reads, pot...
📅 14 days ago • Feb 23, 2026CVE-2019-25461 is an unauthenticated SQL injection vulnerability in Web Ofisi Platinum E-Ticaret v5 e-commerce software. Attackers can inject maliciou...
📅 15 days ago • Feb 22, 2026Web Ofisi Firma v13 contains an unauthenticated SQL injection vulnerability in the 'oz' parameter. Attackers can inject malicious SQL payloads via GET...
📅 15 days ago • Feb 22, 2026Web Ofisi E-Ticaret v3 contains an unauthenticated SQL injection vulnerability in the 'a' parameter that allows attackers to execute arbitrary SQL que...
📅 15 days ago • Feb 22, 2026Dolibarr ERP/CRM 10.0.1 contains SQL injection vulnerabilities in card.php endpoints that allow authenticated attackers to inject malicious SQL throug...
📅 15 days ago • Feb 22, 2026GetSimple CMS has a path traversal vulnerability in its Uploaded Files feature that allows attackers to read arbitrary files on the server. This affec...
📅 17 days ago • Feb 21, 2026This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on LabCollector 5.423 by injecting malicious code through login ...
📅 17 days ago • Feb 20, 2026CVE-2019-25432 is an SQL injection vulnerability in Part-DB's authentication system that allows unauthenticated attackers to bypass login by injecting...
📅 17 days ago • Feb 20, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats