🔥 Trending CVEs - Last 30 Days
1,263 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
CVE-2026-28501 is an unauthenticated SQL injection vulnerability in WWBN AVideo that allows attackers to execute arbitrary SQL commands without authen...
⚡ Yesterday • Mar 6, 2026This is a critical remote code execution vulnerability in Microsoft Devices Pricing Program that allows attackers to execute arbitrary code on affecte...
⚡ Yesterday • Mar 5, 2026This vulnerability allows attackers to bypass allowlist restrictions in Nextcloud Talk by changing their display name to match an allowlisted user ID....
⚡ Yesterday • Mar 5, 2026OpenClaw versions before 2026.2.2 have a command injection vulnerability where attackers can bypass allowlist restrictions by using Windows cmd.exe me...
⚡ Yesterday • Mar 5, 2026Nginx UI versions before 2.3.3 expose an unauthenticated API endpoint that discloses encryption keys in response headers, allowing attackers to downlo...
⚡ Yesterday • Mar 5, 2026The Database for Contact Form 7, WPforms, Elementor forms WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrusted inpu...
⚡ Yesterday • Mar 5, 2026A stack buffer overflow vulnerability in D-Link DIR-513 routers allows remote attackers to execute arbitrary code via the curTime parameter in the gof...
📅 2 days ago • Mar 4, 2026OpenSTAManager versions 2.9.8 and earlier contain an authentication bypass and privilege escalation vulnerability that allows attackers to arbitrarily...
📅 3 days ago • Mar 3, 2026This CVE describes a remote command injection vulnerability in D-Link DIR-868L routers via the SSDP service. Attackers can execute arbitrary operating...
📅 3 days ago • Mar 3, 2026An authentication bypass vulnerability in Weintek cMT-3072XH2 HMI devices allows unauthorized attackers to perform administrative actions using servic...
📅 3 days ago • Mar 3, 2026A heap-based buffer overflow vulnerability in libbiosig's Intan CLP parsing allows arbitrary code execution when processing malicious files. This affe...
📅 3 days ago • Mar 3, 2026OpenMQ's management service ships with default admin credentials (admin/admin) that are never forced to change, allowing remote attackers who can reac...
📅 3 days ago • Mar 3, 2026This vulnerability allows unauthenticated attackers to create administrator accounts on WordPress sites using the User Registration & Membership plugi...
📅 4 days ago • Mar 3, 2026The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress has an authentication bypass vulnerability that allows unauthenticat...
📅 4 days ago • Mar 3, 2026This vulnerability allows remote code execution in Chamilo LMS by exploiting unfiltered parameter evaluation in SOAP requests. Attackers can execute a...
📅 4 days ago • Mar 2, 2026SimStudio versions below 0.5.74 have MongoDB tool endpoints that accept arbitrary connection parameters without authentication or host restrictions. T...
📅 4 days ago • Mar 2, 2026U-Office Force software has an insecure deserialization vulnerability that allows unauthenticated attackers to remotely execute arbitrary code on affe...
📅 4 days ago • Mar 2, 2026CVE-2026-2999 is a critical remote code execution vulnerability in IDExpert Windows Logon Agent that allows unauthenticated attackers to force the sys...
📅 4 days ago • Mar 2, 2026CVE-2026-27975 is an unauthenticated remote code execution vulnerability in Ajenti server admin panel. Attackers can execute arbitrary code on servers...
📅 9 days ago • Feb 26, 2026This vulnerability in Langflow's CSV Agent node allows attackers to execute arbitrary Python and OS commands on the server via prompt injection, leadi...
📅 9 days ago • Feb 26, 2026This CVE describes a use-after-free vulnerability in FreeRDP's clipboard handling for X11 clients. When FreeRDP automatically reconnects, one thread f...
📅 9 days ago • Feb 25, 2026This is a use-after-free vulnerability in FreeRDP's X11 client implementation where the RDPGFX DVC thread can access a freed window pointer while the ...
📅 9 days ago • Feb 25, 2026This is a use-after-free vulnerability in FreeRDP's X11 client where a cached XImage continues to reference freed memory. Attackers could potentially ...
📅 9 days ago • Feb 25, 2026An unauthenticated remote code execution vulnerability in Juniper PTX Series routers allows attackers to execute arbitrary code as root by exploiting ...
📅 9 days ago • Feb 25, 2026This critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Manager allows unauthenticated remote attackers to gain netadmin privileges...
📅 9 days ago • Feb 25, 2026This vulnerability allows SQL injection through TLS-SRP handshake parameters, enabling attackers to inject known credentials into the database. Succes...
📅 9 days ago • Feb 25, 2026This critical vulnerability allows attackers to bypass authentication mechanisms in ePati Antikor Next Generation Firewall (NGFW), potentially gaining...
📅 9 days ago • Feb 25, 2026A path traversal vulnerability in Lanscope Endpoint Manager (On-Premises) Sub-Manager Server allows attackers to access arbitrary files outside intend...
📅 10 days ago • Feb 25, 2026FreeScout's authentication system uses a predictable, static token that never expires. If an attacker obtains the Laravel APP_KEY (commonly exposed), ...
📅 10 days ago • Feb 25, 2026A critical path traversal and extension bypass vulnerability in Flask-Reuploaded versions before 1.5.0 allows remote attackers to write arbitrary file...
📅 10 days ago • Feb 25, 2026The SPIP tickets plugin contains an unauthenticated remote code execution vulnerability in forum preview handling. Attackers can inject malicious cont...
📅 10 days ago • Feb 25, 2026CVE-2026-21410 is a SQL injection vulnerability in SAT MasterSCADA BUK-TS web interface that allows attackers to execute arbitrary SQL commands. Succe...
📅 10 days ago • Feb 24, 2026Tattile Smart+, Vega, and Basic device families ship with default administrative credentials that cannot be changed during initial setup. Attackers wh...
📅 10 days ago • Feb 24, 2026CVE-2026-27590 is a path confusion vulnerability in Caddy server's FastCGI handling that occurs when processing Unicode characters in request paths. A...
📅 10 days ago • Feb 24, 2026Binardat 10G08-0800GSM network switches contain hard-coded administrative credentials that cannot be changed, allowing attackers with knowledge of the...
📅 10 days ago • Feb 24, 2026CVE-2025-69985 is an authentication bypass vulnerability in FUXA SCADA/HMI software that allows remote unauthenticated attackers to execute arbitrary ...
📅 10 days ago • Feb 24, 2026A JIT miscompilation vulnerability in Firefox's JavaScript: WebAssembly component could allow arbitrary code execution when processing malicious web c...
📅 10 days ago • Feb 24, 2026A spoofing vulnerability in the WebAuthn component of Firefox for Android allows attackers to potentially impersonate legitimate websites during authe...
📅 10 days ago • Feb 24, 2026A use-after-free vulnerability in Firefox's JavaScript engine allows attackers to execute arbitrary code by tricking users into visiting malicious web...
📅 10 days ago • Feb 24, 2026This vulnerability involves incorrect boundary conditions in the GMP (Gecko Media Plugins) audio/video component of Firefox, which could allow memory ...
📅 10 days ago • Feb 24, 2026This CVE describes a same-origin policy bypass vulnerability in Firefox's JAR (Java Archive) networking component. It allows malicious websites to acc...
📅 10 days ago • Feb 24, 2026Memory safety vulnerabilities in Mozilla Firefox and Thunderbird could allow memory corruption attacks. With sufficient effort, attackers could exploi...
📅 10 days ago • Feb 24, 2026This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component. Attackers could exploit this to gain elevated privileges wi...
📅 10 days ago • Feb 24, 2026This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component that allows attackers to gain elevated privileges on affecte...
📅 10 days ago • Feb 24, 2026This CVE describes a DOM security component mitigation bypass vulnerability in Firefox. Attackers could potentially bypass security controls to execut...
📅 10 days ago • Feb 24, 2026This CVE describes a use-after-free vulnerability in Firefox's DOM Bindings (WebIDL) component that could allow an attacker to execute arbitrary code....
📅 10 days ago • Feb 24, 2026A use-after-free vulnerability in Firefox's audio/video playback component allows attackers to execute arbitrary code or cause crashes. This affects F...
📅 10 days ago • Feb 24, 2026An integer overflow vulnerability in Firefox's Audio/Video component could allow attackers to execute arbitrary code or cause denial of service. This ...
📅 10 days ago • Feb 24, 2026A use-after-free vulnerability in Firefox's JavaScript garbage collector component allows attackers to execute arbitrary code by manipulating memory a...
📅 10 days ago • Feb 24, 2026An integer overflow vulnerability in Firefox's JavaScript Standard Library component could allow attackers to execute arbitrary code or cause denial o...
📅 10 days ago • Feb 24, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats