🔥 Trending CVEs - Last 90 Days
4,668 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This is a critical remote code execution vulnerability in Zenitel devices that allows unauthenticated attackers to execute arbitrary commands by injec...
📅 56 days ago • Jan 9, 2026This is a critical deserialization vulnerability in Fastjson that allows remote code execution via JNDI injection. Attackers can exploit it by sending...
📅 56 days ago • Jan 9, 2026This vulnerability in n8n workflow automation platform allows unauthenticated remote attackers to execute certain form-based workflows that can access...
📅 58 days ago • Jan 8, 2026A command injection vulnerability in terminal-controller-mcp 0.1.7 allows attackers to execute arbitrary system commands by providing malicious input ...
📅 58 days ago • Jan 7, 2026Anevia Flamingo XL 3.2.9 contains a restricted shell escape vulnerability that allows remote attackers to bypass the sandboxed environment via the tra...
📅 66 days ago • Dec 30, 2025This critical vulnerability allows unauthenticated attackers to upload arbitrary files to any location on vulnerable SmarterMail servers, potentially ...
📅 68 days ago • Dec 29, 2025CVE-2025-54322 is an unauthenticated remote code execution vulnerability in Xspeeder SXZOS that allows attackers to execute arbitrary Python code as r...
📅 69 days ago • Dec 27, 2025An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers to upload malicious PDF files that can lead to remote code execution. T...
📅 74 days ago • Dec 22, 2025This critical vulnerability in Azure Container Apps allows remote attackers to execute arbitrary code via code injection. Any organization using vulne...
📅 78 days ago • Dec 18, 2025CVE-2025-65041 is an improper authorization vulnerability in Microsoft Partner Center that allows unauthorized attackers to elevate privileges over a ...
📅 78 days ago • Dec 18, 2025CVE-2025-62521 is a critical pre-authentication remote code execution vulnerability in ChurchCRM that allows unauthenticated attackers to inject arbit...
📅 79 days ago • Dec 17, 2025An unauthenticated remote attacker can execute arbitrary system commands with root privileges on Cisco Secure Email Gateway and Cisco Secure Email and...
📅 79 days ago • Dec 17, 2025This critical vulnerability in Step CA allows attackers to bypass authorization checks in ACME or SCEP provisioners, enabling unauthorized certificate...
📅 79 days ago • Dec 17, 2025This vulnerability in Sandboxie allows sandboxed processes to exploit an integer overflow in the SbieSvc.exe service, leading to heap overflow and arb...
📅 85 days ago • Dec 11, 2025This vulnerability allows authenticated attackers with workflow write access in one project to create and manage sites on servers belonging to other p...
🔥 Today • Mar 6, 2026OpenClaw gateway versions before 2026.2.14 have an authorization bypass vulnerability where authenticated clients can manipulate node.invoke parameter...
⚡ Yesterday • Mar 5, 2026This vulnerability allows attackers with read/write access to Vitess backup storage locations to manipulate backup manifest files, leading to arbitrar...
📅 9 days ago • Feb 26, 2026This vulnerability in OpenLIT's GitHub Actions workflows allows attackers to execute arbitrary code with repository write privileges and access sensit...
📅 9 days ago • Feb 26, 2026This vulnerability in n8n allows authenticated users with workflow creation/modification permissions to escape the JavaScript Task Runner sandbox and ...
📅 9 days ago • Feb 25, 2026OpenEMR versions before 8.0.0 contain an SQL injection vulnerability in the Patient REST API endpoint that allows authenticated users with API access ...
📅 9 days ago • Feb 25, 2026CVE-2026-27728 is an OS command injection vulnerability in OneUptime's NetworkPathMonitor.performTraceroute() function that allows authenticated proje...
📅 9 days ago • Feb 25, 2026This CVE describes a critical server-side JavaScript injection vulnerability in Budibase Cloud (SaaS) that allows any authenticated user to execute ar...
📅 9 days ago • Feb 25, 2026This CVE allows attackers to manipulate PersistentVolume path patterns to create volumes in arbitrary host node locations, potentially overwriting sen...
📅 9 days ago • Feb 25, 2026CVE-2026-27626 allows authenticated users to execute arbitrary OS commands on OliveTin hosts by injecting shell metacharacters through password-type a...
📅 10 days ago • Feb 25, 2026CVE-2026-24849 is an arbitrary file read vulnerability in OpenEMR's EtherFaxActions.php. Any authenticated user, regardless of privilege level, can ex...
📅 10 days ago • Feb 25, 2026CVE-2026-27574 allows remote code execution in OneUptime monitoring software. Any user with ProjectMember role (including anonymous users via open reg...
📅 13 days ago • Feb 21, 2026This vulnerability allows attackers to upload malicious files to WordPress sites using the Bravis Addons plugin. It affects all WordPress installation...
📅 14 days ago • Feb 20, 2026This vulnerability allows attackers to upload malicious files, including web shells, to servers running the Wiguard WordPress theme. It affects all ve...
📅 14 days ago • Feb 20, 2026Microsoft Semantic Kernel Python SDK versions before 1.39.4 contain a remote code execution vulnerability in the InMemoryVectorStore filter functional...
📅 15 days ago • Feb 19, 2026This CVE describes a Server-Side Template Injection vulnerability in Datart's Freemarker template engine that allows authenticated attackers to execut...
📅 17 days ago • Feb 17, 2026An authenticated attacker in SAP CRM and SAP S/4HANA can exploit a flaw in the Scripting Editor's generic function module to execute arbitrary SQL sta...
📅 25 days ago • Feb 10, 2026This vulnerability in GitLab AI Gateway allows attackers to execute arbitrary code or cause denial of service through insecure template expansion in D...
📅 25 days ago • Feb 9, 2026OpenProject versions before 16.6.7 and 17.0.3 contain an arbitrary file write vulnerability that can lead to remote code execution. Attackers with rep...
📅 28 days ago • Feb 6, 2026CVE-2026-25592 is an arbitrary file write vulnerability in Microsoft's Semantic Kernel .NET SDK that allows attackers to write files to arbitrary loca...
📅 28 days ago • Feb 6, 2026This vulnerability in n8n workflow automation platform allows authenticated users with workflow creation/modification permissions to read sensitive fi...
📅 30 days ago • Feb 4, 2026This vulnerability in n8n workflow automation platform allows authenticated users with workflow creation/modification permissions to execute arbitrary...
📅 30 days ago • Feb 4, 2026This vulnerability in n8n's Python Code node allows authenticated users to escape the Python sandbox and execute arbitrary code on the underlying syst...
📅 30 days ago • Feb 4, 2026This vulnerability allows authenticated users with workflow creation/modification permissions in n8n to execute arbitrary system commands on the host ...
📅 30 days ago • Feb 4, 2026This vulnerability allows authenticated users with file editor permissions in CI4MS to achieve remote code execution by uploading and executing arbitr...
📅 31 days ago • Feb 3, 2026Signal K Server versions before 1.5.0 contain a command injection vulnerability in the set-system-time plugin that allows authenticated users with wri...
📅 32 days ago • Feb 2, 2026An input neutralization vulnerability in Crafty Controller's File Operations API Endpoint allows authenticated attackers to perform path traversal att...
📅 35 days ago • Jan 30, 2026Explorance Blue versions before 8.14.13 contain an authenticated remote file download vulnerability that can be exploited to achieve remote code execu...
📅 37 days ago • Jan 28, 2026CVE-2026-24841 is a critical command injection vulnerability in Dokploy, a self-hosted PaaS, allowing authenticated attackers to execute arbitrary com...
📅 38 days ago • Jan 28, 2026This vulnerability in Dozzle allows users restricted by label filters to bypass container isolation and obtain interactive root shells in out-of-scope...
📅 38 days ago • Jan 27, 2026This critical vulnerability in n8n's workflow Expression evaluation system allows authenticated users to execute arbitrary code on the server. Attacke...
📅 38 days ago • Jan 27, 2026CVE-2025-70982 is an improper access control vulnerability in SpringBlade v4.5.0 that allows attackers with low-level privileges to import sensitive u...
📅 39 days ago • Jan 26, 2026This vulnerability allows attackers with low-level privileges to escalate their privileges in SpringBlade v4.5.0 due to incorrect access control in th...
📅 42 days ago • Jan 23, 2026This critical vulnerability in Azure Resource Manager allows authenticated attackers to escalate privileges within Azure environments. Attackers with ...
📅 43 days ago • Jan 23, 2026This vulnerability allows attackers to upload arbitrary files, including web shells, to servers running the Miion WordPress theme. Attackers can achie...
📅 43 days ago • Jan 22, 2026CVE-2025-68909 is an arbitrary file upload vulnerability in the Blogistic WordPress theme that allows attackers to upload malicious files without prop...
📅 43 days ago • Jan 22, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats