🔥 Trending CVEs - Last 90 Days
4,472 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This is a stored cross-site scripting (XSS) vulnerability in Bugsink error tracking software. Unauthenticated attackers who can submit error events to...
📅 13 days ago • Feb 25, 2026This vulnerability in Statmatic CMS allows attackers to hijack password reset tokens and take over user accounts. Attackers need a valid email address...
📅 13 days ago • Feb 24, 2026CVE-2026-25896 is a vulnerability in fast-xml-parser where a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement...
📅 17 days ago • Feb 20, 2026This SQL injection vulnerability in Download Manager Addons for Elementor allows attackers to execute arbitrary SQL commands against the WordPress dat...
📅 17 days ago • Feb 20, 2026This SQL injection vulnerability in the Wolmart Core WordPress plugin allows attackers to execute arbitrary SQL commands on affected databases. It aff...
📅 17 days ago • Feb 20, 2026This SQL injection vulnerability in the TeconceTheme Emerce Core WordPress plugin allows attackers to execute arbitrary SQL commands on the database. ...
📅 17 days ago • Feb 20, 2026This SQL injection vulnerability in the Saasplate Core WordPress plugin allows attackers to execute arbitrary SQL commands against the database. It af...
📅 17 days ago • Feb 20, 2026This SQL injection vulnerability in the Crete Core WordPress plugin allows attackers to execute arbitrary SQL commands against the database. It affect...
📅 17 days ago • Feb 20, 2026This CVE describes a blind SQL injection vulnerability in the TeconceTheme Medinik Core WordPress plugin. Attackers can inject malicious SQL queries t...
📅 17 days ago • Feb 20, 2026This vulnerability in Kata Containers allows a container user to modify the Guest micro VM's file system, leading to arbitrary code execution as root ...
📅 18 days ago • Feb 19, 2026This vulnerability allows an attacker with code execution on the infotainment system's main processor to execute arbitrary code on the RH850 CAN commu...
📅 23 days ago • Feb 15, 2026This vulnerability allows local attackers to map arbitrary memory addresses due to missing bounds checking in the vpu_mmap function. This can lead to ...
📅 32 days ago • Feb 5, 2026This prototype pollution vulnerability in Qwik's formToObj() function allows unauthenticated attackers to modify Object.prototype by sending specially...
📅 34 days ago • Feb 3, 2026FUXA v1.2.7 has an insecure default configuration where authentication is disabled by default due to a commented-out 'secureEnabled' flag. This allows...
📅 34 days ago • Feb 3, 2026This CVE describes a privilege escalation vulnerability in MediaTek wlan STA drivers where missing bounds checks allow local attackers to gain elevate...
📅 36 days ago • Feb 2, 2026This vulnerability allows attackers to inject malicious HTML/JavaScript payloads into ChatterMate chatbot inputs, which are then executed in users' br...
📅 45 days ago • Jan 24, 2026This vulnerability in M365 Copilot allows unauthorized attackers to access sensitive information over the network due to improper input validation. Al...
📅 46 days ago • Jan 22, 2026This critical vulnerability in Azure Entra ID (formerly Azure Active Directory) allows attackers to elevate privileges within cloud environments. Atta...
📅 46 days ago • Jan 22, 2026This cross-site scripting (XSS) vulnerability in Microsoft Account allows attackers to inject malicious scripts into web pages viewed by other users. ...
📅 46 days ago • Jan 22, 2026This SQL injection vulnerability in the Paid Downloads WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects...
📅 46 days ago • Jan 22, 2026This SQL injection vulnerability in the CleverReach® WP WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affec...
📅 46 days ago • Jan 22, 2026This SQL injection vulnerability in the MailerLite WooCommerce integration plugin allows attackers to execute arbitrary SQL commands on the WordPress ...
📅 46 days ago • Jan 22, 2026This cross-site scripting vulnerability in Movary allows attackers to inject malicious scripts via the 'categoryUpdated' parameter. Users running Mova...
📅 49 days ago • Jan 19, 2026This cross-site scripting (XSS) vulnerability in Movary allows attackers to inject malicious scripts via the 'categoryDeleted' parameter. Users of Mov...
📅 49 days ago • Jan 19, 2026CVE-2026-23841 is a cross-site scripting (XSS) vulnerability in Movary web application versions prior to 0.70.0. Attackers can inject malicious script...
📅 49 days ago • Jan 19, 2026This vulnerability in OWASP Core Rule Set (CRS) allows attackers to bypass multipart request filtering in web application firewalls. When processing m...
📅 60 days ago • Jan 8, 2026CVE-2026-21855 is a reflected Cross-Site Scripting (XSS) vulnerability in Tarkov Data Manager's toast notification system that allows attackers to exe...
📅 61 days ago • Jan 7, 2026This SQL injection vulnerability in the WPCHURCH WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all v...
📅 61 days ago • Jan 7, 2026CVE-2026-21430 is a CSRF vulnerability in Emlog's article creation functionality that allows attackers to force users to post malicious articles. When...
📅 66 days ago • Jan 2, 2026Ksenia Security Lares 4.0 Home Automation version 1.6 contains an unprotected endpoint that allows authenticated attackers to upload MPFS File System ...
📅 69 days ago • Dec 30, 2025A serialization injection vulnerability in LangChain's dumps() and dumpd() functions allows attackers to inject malicious data that gets treated as le...
📅 76 days ago • Dec 23, 2025This SQL injection vulnerability in the Advance Seat Reservation Management for WooCommerce plugin allows attackers to execute arbitrary SQL commands ...
📅 82 days ago • Dec 18, 2025Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulnerability that allows attackers to execute arbitrary...
📅 89 days ago • Dec 10, 2025Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulnerability that allows attackers to execute arbitrary...
📅 89 days ago • Dec 10, 2025Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulnerability that allows attackers to execute arbitrary...
📅 89 days ago • Dec 10, 2025This vulnerability allows attackers to execute arbitrary operating system commands with root privileges within the container running bleon-ethical/api...
📅 13 days ago • Feb 24, 2026This vulnerability allows unauthorized remote attackers to upload and apply arbitrary updates via the wwwupdate.cgi endpoint due to insufficient autho...
⚡ Yesterday • Mar 9, 2026This vulnerability in Soft Serve allows authenticated SSH users to perform Server-Side Request Forgery (SSRF) attacks by exploiting the repo import fe...
📅 2 days ago • Mar 7, 2026This broken access control vulnerability in File Browser allows authenticated users with only Create permission to delete files and directories they s...
📅 4 days ago • Mar 5, 2026CVE-2026-24457 is a path traversal vulnerability in OpenMQ's configuration parsing that allows remote attackers to read arbitrary files from the MQ Br...
📅 4 days ago • Mar 5, 2026A typo in Froxlor's input validation code (== instead of =) disables email format checking for admin email settings. This allows authenticated admins ...
📅 6 days ago • Mar 3, 2026CVE-2026-27812 is a password reset poisoning vulnerability in Sub2API versions before 0.1.85 that allows attackers to manipulate password reset links ...
📅 12 days ago • Feb 26, 2026This vulnerability in Vikunja task management software allows attackers to compromise accounts through weak password policies and maintain persistent ...
📅 12 days ago • Feb 25, 2026This vulnerability allows attackers to extract administrative credentials from Gardyn IoT Hub through API responses, mobile app reverse engineering, o...
📅 12 days ago • Feb 25, 2026The basic-ftp Node.js library contains a path traversal vulnerability in the downloadToDir() method. A malicious FTP server can send filenames contain...
📅 12 days ago • Feb 25, 2026This vulnerability in Octopus Deploy allows attackers to delete files or file contents on the host system through an unauthenticated API endpoint lack...
📅 12 days ago • Feb 25, 2026Caddy servers with host lists exceeding 100 entries have a case-sensitivity vulnerability in the HTTP host matcher. Attackers can bypass host-based ro...
📅 13 days ago • Feb 24, 2026CVE-2026-27586 is a critical authentication bypass vulnerability in Caddy server where mTLS client certificate authentication silently fails open when...
📅 13 days ago • Feb 24, 2026This vulnerability involves uninitialized memory in Firefox's Graphics: Text component, which could allow attackers to read sensitive data from memory...
📅 13 days ago • Feb 24, 2026A type confusion vulnerability in SolarWinds Serv-U allows attackers with administrative privileges to execute arbitrary native code with elevated pri...
📅 14 days ago • Feb 24, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats