🔥 Trending CVEs - Last 30 Days
1,214 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
A directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to access sensitive files or delete arbitrary files by manipulating input to ...
📅 26 days ago • Feb 11, 2026This vulnerability allows unauthenticated remote attackers to access and export the internal telemetry SQLite database containing sensitive operationa...
📅 27 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to send repeated GraphQL queries to GitLab instances, causing denial of service by exhausting serv...
📅 27 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to cause denial of service on GitLab instances by bypassing JSON validation middleware limits, lea...
📅 27 days ago • Feb 11, 2026This vulnerability in MongoDB allows connections from proxy ports to bypass connection counting, potentially causing server crashes when connection li...
📅 27 days ago • Feb 10, 2026ClipBucket v5 versions before 5.5.3 - #40 have a TOCTOU race condition in avatar/background image uploads. Attackers can upload malicious PHP files th...
📅 27 days ago • Feb 10, 2026This vulnerability in the Emmett framework allows unauthenticated attackers to send malformed Cookie headers that trigger unhandled CookieError except...
📅 27 days ago • Feb 10, 2026This vulnerability allows attackers to spoof identities or data in Microsoft Office Outlook by exploiting insecure deserialization of untrusted data. ...
📅 27 days ago • Feb 10, 2026This vulnerability allows an unauthorized attacker to trigger a null pointer dereference in Windows LDAP service, causing a denial of service. Any Win...
📅 27 days ago • Feb 10, 2026This vulnerability is a buffer over-read in Windows GDI+ that allows an unauthorized attacker to cause a denial of service over a network. It affects ...
📅 27 days ago • Feb 10, 2026This .NET vulnerability allows unauthorized attackers to perform spoofing attacks over a network by exploiting improper handling of missing special el...
📅 27 days ago • Feb 10, 2026The Ninja Forms WordPress plugin has a vulnerability that allows unauthenticated attackers to extract sensitive post metadata from any post on the sit...
📅 28 days ago • Feb 10, 2026Docpedia developed by Flowring contains a SQL injection vulnerability that allows unauthenticated remote attackers to execute arbitrary SQL commands a...
📅 28 days ago • Feb 10, 2026CVE-2026-0485 is a denial-of-service vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to crash and restart the C...
📅 28 days ago • Feb 10, 2026CVE-2026-0490 is an authentication bypass vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to send crafted netwo...
📅 28 days ago • Feb 10, 2026Adminer v5.4.1 and earlier has a version check endpoint that lacks origin validation, allowing attackers to send malformed POST data. This causes a PH...
📅 28 days ago • Feb 9, 2026This vulnerability allows network attackers to intercept SumatraPDF's update requests and deliver malicious installers due to disabled TLS hostname ve...
📅 28 days ago • Feb 9, 2026CVE-2026-25885 is an authentication bypass vulnerability in PolarLearn's WebSocket group chat functionality. Unauthenticated attackers can subscribe t...
📅 28 days ago • Feb 9, 2026This vulnerability in Hollo microblogging software exposes private direct messages and followers-only posts through the ActivityPub outbox endpoint wi...
📅 28 days ago • Feb 9, 2026PlaciPy placement management system logs sensitive data to console output without redaction in version 1.0.0. This allows attackers with access to con...
📅 28 days ago • Feb 9, 2026This vulnerability in Axios allows attackers to cause denial of service by providing malicious configuration objects containing __proto__ as an own pr...
📅 28 days ago • Feb 9, 2026This vulnerability in Sliver C2 framework allows unauthenticated attackers to create unlimited DNS sessions without OTP validation, leading to memory ...
📅 28 days ago • Feb 9, 2026FileRise versions before 3.3.0 have an unauthenticated file read vulnerability where anyone can access files in the /uploads directory without authent...
📅 28 days ago • Feb 9, 2026CVE-2026-2236 is a SQL injection vulnerability in HGiga's C&Cm@il software that allows unauthenticated remote attackers to execute arbitrary SQL comma...
📅 29 days ago • Feb 9, 2026This vulnerability allows unauthenticated remote attackers to bypass authentication by exploiting insufficient URI validation. Attackers can use path ...
📅 29 days ago • Feb 9, 2026Yokogawa FAST/TOOLS industrial control system software uses weak cryptographic algorithms, potentially allowing attackers to decrypt web server commun...
📅 29 days ago • Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS software allows attackers to potentially decrypt communications by exploiting support for outdated SSL/TLS...
📅 29 days ago • Feb 9, 2026A path traversal vulnerability in Yokogawa's FAST/TOOLS software allows attackers to bypass URL validation and access arbitrary files on the web serve...
📅 29 days ago • Feb 9, 2026This vulnerability allows attackers to bypass authentication rate limiting in HomeBox by forging IP headers, enabling brute-force attacks on login cre...
📅 6 days ago • Mar 3, 2026Zed code editor versions before 0.224.4 contain a Zip Slip vulnerability in the extension archive extraction functionality. This allows malicious exte...
📅 12 days ago • Feb 26, 2026An unauthenticated attacker on the same network segment can send a specially crafted LLDP packet to vulnerable Cisco NX-OS devices, causing the LLDP p...
📅 12 days ago • Feb 25, 2026This vulnerability is a stack-based buffer overflow in ImageMagick's FTXT image reader, allowing crafted FTXT files to cause out-of-bounds writes on t...
📅 14 days ago • Feb 24, 2026A local privilege escalation vulnerability in Tencent iOA for Windows allows authenticated local users to execute programs with elevated privileges by...
📅 14 days ago • Feb 23, 2026This vulnerability allows man-in-the-middle attacks by disabling TLS/SSL certificate validation in jxcore jxm master. When 'jx_obj.IsSecure' is true, ...
📅 15 days ago • Feb 23, 2026This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Shiprocket WordPress plugin that allows attackers to bypass authori...
📅 18 days ago • Feb 20, 2026This vulnerability allows local users with knowledge of IBM Concert's system architecture to escalate privileges by exploiting incorrect file permissi...
📅 20 days ago • Feb 17, 2026This vulnerability in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code on the server by sending a specially crafted AJAX response. This...
📅 25 days ago • Feb 13, 2026This vulnerability in the Galaxy FDS Android SDK disables TLS hostname verification, allowing man-in-the-middle attackers to intercept and modify comm...
📅 26 days ago • Feb 12, 2026Litestar ASGI framework versions before 2.20.0 have a CORS origin validation bypass vulnerability. Attackers can craft malicious origin headers that m...
📅 28 days ago • Feb 9, 2026Keygraph Shannon contains a hard-coded API key in its router configuration that allows network attackers to authenticate using a publicly known static...
🔥 Today • Mar 9, 2026This CVE describes a SQL injection vulnerability in Tiandy Easy7 CMS Windows version 7.17.0. Attackers can remotely exploit the /Easy7/apps/WebService...
⚡ Yesterday • Mar 9, 2026This vulnerability allows attackers to bypass authentication in DoraCMS 3.0.x by exploiting the Email API endpoint /api/v1/mail/send. Attackers can re...
⚡ Yesterday • Mar 9, 2026This vulnerability in SourceCodester Client Database Management System 1.0 allows attackers to bypass authorization controls and perform unauthorized ...
⚡ Yesterday • Mar 8, 2026This vulnerability in SourceCodester Client Database Management System allows unauthorized deletion of manager accounts via improper authorization in ...
⚡ Yesterday • Mar 8, 2026CVE-2026-3757 is a SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 that allows remote attackers to execute arbitrary SQL comm...
⚡ Yesterday • Mar 8, 2026This SQL injection vulnerability in projectworlds Online Art Gallery Shop 1.0 allows remote attackers to execute arbitrary SQL commands via the reach_...
⚡ Yesterday • Mar 8, 2026CVE-2026-3746 is an SQL injection vulnerability in SourceCodester Simple Responsive Tourism Website 1.0 that allows attackers to execute arbitrary SQL...
📅 2 days ago • Mar 8, 2026This SQL injection vulnerability in Student Web Portal 1.0 allows attackers to manipulate database queries through the password registration field. Re...
📅 2 days ago • Mar 8, 2026This CVE describes a SQL injection vulnerability in itsourcecode University Management System 1.0, specifically in the /admin_search_student.php file....
📅 2 days ago • Mar 8, 2026This CVE describes a SQL injection vulnerability in code-projects Simple Flight Ticket Booking System 1.0. Attackers can manipulate the 'from' paramet...
📅 2 days ago • Mar 8, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats