🔥 Trending CVEs - Last 30 Days
1,218 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization vulnerability in changelog processing. While no current explo...
📅 17 days ago • Feb 20, 2026CVE-2026-24891 is an unsafe deserialization vulnerability in openITCOCKPIT monitoring tool that allows PHP Object Injection when untrusted systems can...
📅 17 days ago • Feb 20, 2026This vulnerability exposes user credentials through unencrypted HTTP Basic Authentication in an embedded web interface. Attackers on the same network ...
📅 17 days ago • Feb 20, 2026This vulnerability allows attackers to bypass authentication and spoof identities in the WooODT Lite WordPress plugin. It affects all WooCommerce site...
📅 17 days ago • Feb 20, 2026This CVE describes a PHP Local File Inclusion vulnerability in the Simple Retail Menus WordPress plugin. Attackers can include arbitrary local files f...
📅 17 days ago • Feb 20, 2026This CVE describes a missing authorization vulnerability in the Jthemes Exzo WordPress theme that allows attackers to bypass access controls. It affec...
📅 17 days ago • Feb 20, 2026This CVE describes a PHP Local File Inclusion vulnerability in the WP Shop WordPress plugin. Attackers can include arbitrary local files through impro...
📅 17 days ago • Feb 20, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 17 days ago • Feb 20, 2026This CVE describes a missing authorization vulnerability in the ModelTheme Framework WordPress plugin that allows attackers to bypass access controls....
📅 17 days ago • Feb 20, 2026This CVE describes a missing authorization vulnerability in the GhostPool Gauge WordPress theme that allows attackers to bypass access controls. The v...
📅 17 days ago • Feb 20, 2026This CVE describes a Missing Authorization vulnerability in the NextMove Lite WordPress plugin that allows attackers to bypass access controls. The vu...
📅 17 days ago • Feb 20, 2026This CVE describes a Missing Authorization vulnerability in the YayCommerce YayCurrency WordPress plugin that allows attackers to delete arbitrary con...
📅 17 days ago • Feb 20, 2026OpenClaw's Feishu extension had a path traversal vulnerability that allowed reading arbitrary local files by supplying attacker-controlled paths. This...
📅 18 days ago • Feb 19, 2026OpenClaw's SSRF protection could be bypassed using IPv4-mapped IPv6 addresses, allowing attackers to access restricted internal resources like localho...
📅 18 days ago • Feb 19, 2026OpenClaw versions 2026.2.13 and below with the @openclaw/voice-call plugin allow unauthenticated attackers to forge Telnyx webhook events when telnyx....
📅 18 days ago • Feb 19, 2026This vulnerability allows attackers to bypass authentication in OpenClaw's BlueBubbles iMessage plugin by sending webhook requests from localhost addr...
📅 18 days ago • Feb 19, 2026A logic flaw in httpsig-hyper versions before 0.0.23 causes digest verification to always succeed regardless of actual digest values, allowing message...
📅 18 days ago • Feb 19, 2026A cryptographic flaw in go-ethereum's ECIES implementation allows attackers to extract bits of the p2p node key. This affects all Geth nodes running v...
📅 18 days ago • Feb 19, 2026This CVE describes a PHP Local File Inclusion vulnerability in the VanKarWai Airtifact WordPress theme. Attackers can include arbitrary local files th...
📅 18 days ago • Feb 19, 2026This vulnerability in soroban-sdk allows attackers to bypass security checks in Soroban smart contracts when trait and inherent functions share the sa...
📅 18 days ago • Feb 19, 2026An authenticated user with team edit permissions in Penpot can read arbitrary files from the server filesystem by exploiting a path traversal vulnerab...
📅 18 days ago • Feb 19, 2026This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks through the 'search' parameter in the Product Table an...
📅 18 days ago • Feb 19, 2026The wpForo Forum plugin for WordPress has a time-based SQL injection vulnerability in the 'wpfob' parameter that allows unauthenticated attackers to e...
📅 18 days ago • Feb 19, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 19 days ago • Feb 19, 2026OpenClaw versions 2026.1.30 and below have an authentication bypass vulnerability in Telegram webhook mode. When channels.telegram.webhookSecret is no...
📅 19 days ago • Feb 19, 2026This SQL injection vulnerability in the WordPress Library Management System plugin allows unauthenticated attackers to inject malicious SQL queries th...
📅 19 days ago • Feb 19, 2026The GDPR Cookie Consent WordPress plugin has an unauthenticated REST API vulnerability that allows attackers to retrieve sensitive plugin settings wit...
📅 19 days ago • Feb 19, 2026This vulnerability allows remote attackers to crash the web service on Bematech MP-4200 TH printers by sending specially crafted POST requests to the ...
📅 19 days ago • Feb 18, 2026CVE-2019-25353 is a buffer overflow vulnerability in Foscam Video Management System that allows attackers to cause denial of service by sending a spec...
📅 19 days ago • Feb 18, 2026CVE-2019-25355 is a directory traversal vulnerability in gSOAP 2.8 that allows unauthenticated attackers to access sensitive system files by manipulat...
📅 19 days ago • Feb 18, 2026CVE-2019-25349 is a buffer overflow vulnerability in ScadaApp for iOS that allows attackers to cause a denial of service by crashing the application. ...
📅 19 days ago • Feb 18, 2026CVE-2026-23491 is a path traversal vulnerability in InvoicePlane that allows unauthenticated attackers to read arbitrary files on the server by manipu...
📅 19 days ago • Feb 18, 2026This vulnerability in Rack's Rack::Directory component allows attackers to bypass directory restrictions using path traversal techniques. By crafting ...
📅 19 days ago • Feb 18, 2026A vulnerability in BIG-IP AFM or BIG-IP DDoS modules causes the Traffic Management Microkernel (TMM) to terminate when processing specific undisclosed...
📅 19 days ago • Feb 18, 2026This SQL injection vulnerability in the WPNakama WordPress plugin allows unauthenticated attackers to inject malicious SQL queries through the 'order'...
📅 20 days ago • Feb 18, 2026A TLS certificate validation vulnerability in Guardian Gryphon v01.06.0006.22 allows attackers to bypass authentication and execute arbitrary commands...
📅 20 days ago • Feb 17, 2026The PhotoStack Gallery WordPress plugin contains an SQL injection vulnerability in the 'postid' parameter that allows unauthenticated attackers to exe...
📅 24 days ago • Feb 14, 2026This vulnerability allows authenticated WordPress users with Contributor-level access or higher to perform Local File Inclusion attacks via the Flexi ...
📅 24 days ago • Feb 14, 2026This vulnerability allows unauthenticated attackers to spoof BlueSnap IP addresses and send forged payment notifications to WordPress sites using the ...
📅 24 days ago • Feb 14, 2026A Null Pointer Dereference vulnerability in TON Blockchain's TVM allows attackers to crash validator nodes by sending malicious transactions. This cau...
📅 24 days ago • Feb 13, 2026A stack overflow vulnerability in TON Virtual Machine (TVM) allows attackers to craft smart contracts with deeply nested jump logic that exhausts stac...
📅 24 days ago • Feb 13, 2026A state pollution vulnerability in TON Virtual Machine (TVM) allows denial of service when Out-of-Gas exceptions occur during child VM initialization....
📅 24 days ago • Feb 13, 2026This CVE describes a Denial of Service vulnerability in TON Lite Server where attackers can inject malicious Continuation objects into locally execute...
📅 24 days ago • Feb 13, 2026This vulnerability in BACnet Stack allows attackers to write files to arbitrary directories due to lack of path validation in file writing functionali...
📅 24 days ago • Feb 13, 2026A heap buffer overflow vulnerability in free5GC's UPF component allows remote attackers to crash the UPF service via specially crafted PFCP Session Mo...
📅 24 days ago • Feb 13, 2026A protocol compliance vulnerability in free5GC's UPF component allows remote attackers to send malformed PFCP Association Setup Requests that violate ...
📅 24 days ago • Feb 13, 2026A remote array index out-of-bounds vulnerability in free5GC's AMF component allows attackers to crash the AMF service via specially crafted 5GS Mobile...
📅 24 days ago • Feb 13, 2026CVE-2019-25340 is a stack-based buffer overflow vulnerability in SpotAuditor's Base64 decryption feature that allows attackers to cause denial of serv...
📅 25 days ago • Feb 12, 2026CVE-2019-25342 is a denial of service vulnerability in Centova Cast that allows attackers to overwhelm the system by repeatedly calling the database e...
📅 25 days ago • Feb 12, 2026GHIA CamIP 1.2 for iOS contains a denial of service vulnerability where attackers can crash the application by pasting a 33-character buffer of repeat...
📅 25 days ago • Feb 12, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats