🔥 Trending CVEs - Last 90 Days
4,447 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This is a remote stack-based buffer overflow vulnerability in Tenda F453 routers affecting the exeCommand function. Attackers can exploit this to exec...
📅 2 days ago • Mar 8, 2026A stack-based buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the username/optty...
📅 2 days ago • Mar 8, 2026A stack-based buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the mit_linktype/P...
📅 2 days ago • Mar 8, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda F453 routers by exploiting a stack-based buffer overflow in the webExcpt...
📅 2 days ago • Mar 8, 2026A stack-based buffer overflow vulnerability in the Wavlink WL-WN579X3-C router's firewall.cgi component allows remote attackers to execute arbitrary c...
📅 2 days ago • Mar 8, 2026A remote buffer overflow vulnerability in H3C Magic B1 routers allows attackers to execute arbitrary code by manipulating the param argument in the Ed...
📅 2 days ago • Mar 8, 2026A buffer overflow vulnerability in UTT HiPER 810G routers allows remote attackers to execute arbitrary code or crash the device by exploiting improper...
📅 2 days ago • Mar 8, 2026A buffer overflow vulnerability in the UTT HiPER 810G router's NTP configuration function allows remote attackers to execute arbitrary code or crash t...
📅 2 days ago • Mar 8, 2026A stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers to execute arbitrary code by manipulating the mit_linktype/...
📅 2 days ago • Mar 7, 2026A stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers to execute arbitrary code by manipulating the funcname/func...
📅 2 days ago • Mar 7, 2026WeKnora versions before 0.3.2 have an authorization bypass vulnerability in tenant management endpoints. Any authenticated user can read, modify, or d...
📅 3 days ago • Mar 7, 2026Wallos versions before 4.6.2 contain a server-side request forgery vulnerability in notification testers that allows attackers to make unauthorized re...
📅 3 days ago • Mar 7, 2026CVE-2026-30823 is an Insecure Direct Object Reference (IDOR) vulnerability in Flowise that allows attackers to bypass authorization controls. This ena...
📅 3 days ago • Mar 7, 2026This vulnerability allows authenticated WordPress users with Author-level access or higher to register administrator accounts through a registration f...
📅 3 days ago • Mar 7, 2026This vulnerability in OliveTin allows authentication bypass when JWT authentication is configured. Attackers can use validly signed JWT tokens intende...
📅 3 days ago • Mar 6, 2026This mass assignment vulnerability in Snipe-IT allows authenticated low-privileged users to modify restricted user attributes, including those of Supe...
📅 4 days ago • Mar 6, 2026OpenSift versions before 1.6.3-alpha contain a path traversal vulnerability (CWE-22) in multiple storage helpers that don't properly enforce directory...
📅 4 days ago • Mar 6, 2026This vulnerability allows authenticated low-privileged users in Chamilo LMS to upload malicious files and execute arbitrary code on the server. The sy...
📅 4 days ago • Mar 6, 2026This stored XSS vulnerability in Chamilo LMS allows attackers to inject malicious JavaScript into social network and messaging features. When authenti...
📅 4 days ago • Mar 6, 2026OpenClaw versions before 2026.2.14 have a command hijacking vulnerability where attackers can manipulate PATH environment variables to execute malicio...
📅 4 days ago • Mar 5, 2026This vulnerability allows attackers to bypass authentication in Keycloak by exploiting a disabled SAML client configured as an Identity Provider-initi...
📅 4 days ago • Mar 5, 2026The WowOptin WordPress plugin allows authenticated attackers with Subscriber-level access or higher to install and activate arbitrary plugins without ...
📅 5 days ago • Mar 5, 2026This vulnerability allows attackers to exploit heap corruption in Google Chrome's DevTools through malicious extensions. Users who install untrusted C...
📅 5 days ago • Mar 4, 2026Dell Command | Intel vPro Out of Band versions before 4.7.0 have a path traversal vulnerability that allows local low-privileged attackers to execute ...
📅 6 days ago • Mar 3, 2026A remote buffer overflow vulnerability in LLM-Claw's agent deployment component allows attackers to execute arbitrary code or crash the system. This a...
📅 7 days ago • Mar 3, 2026This vulnerability allows authenticated attackers with Agent-level access in the LatePoint WordPress plugin to escalate privileges by linking customer...
📅 7 days ago • Mar 3, 2026This CVE describes a one-click remote code execution vulnerability in AFFiNE workspace software. Attackers can exploit it by tricking users into visit...
📅 7 days ago • Mar 2, 2026This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary code on servers running the Master...
📅 8 days ago • Mar 2, 2026This vulnerability allows attackers to inject malicious scripts into Chamilo LMS user profiles via CSV import. When other users view these profiles, t...
📅 8 days ago • Mar 2, 2026A stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers to execute arbitrary code by manipulating the wpapsk_crypto2...
📅 8 days ago • Mar 2, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code or cause denial of service by sending speciall...
📅 8 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by sending specially crafted requests to the h...
📅 8 days ago • Mar 1, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda F453 routers by exploiting a buffer overflow in the frmL7ImForm function...
📅 9 days ago • Mar 1, 2026CVE-2026-3378 is a remote buffer overflow vulnerability in Tenda F453 routers affecting the qossetting function. Attackers can exploit this flaw remot...
📅 9 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the fr...
📅 9 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the Sa...
📅 9 days ago • Feb 28, 2026The Worry Proof Backup WordPress plugin contains a path traversal vulnerability that allows authenticated attackers with Subscriber-level access or hi...
📅 12 days ago • Feb 26, 2026This CVE allows attackers with read/write access to Vitess backup storage locations to manipulate backup manifest files and perform path traversal att...
📅 12 days ago • Feb 26, 2026This CVE describes a Python sandbox escape vulnerability in Agenta's API server that allows authenticated users to bypass RestrictedPython sandboxing ...
📅 12 days ago • Feb 26, 2026This vulnerability allows any authenticated non-admin user in WireGuard Portal to elevate their privileges to full administrator by sending a crafted ...
📅 12 days ago • Feb 26, 2026This vulnerability allows authenticated users with workflow creation/modification permissions in n8n to achieve remote code execution by chaining file...
📅 12 days ago • Feb 25, 2026LORIS versions before 26.0.5, 27.0.2, and 28.0.0 contain a path traversal vulnerability in the media module that allows authenticated users with suffi...
📅 12 days ago • Feb 25, 2026A heap buffer overflow vulnerability in FreeRDP clients allows a malicious RDP server to execute arbitrary code on connecting clients. Attackers contr...
📅 12 days ago • Feb 25, 2026OpenEMR versions before 8.0.0 contain a SQL injection vulnerability in the prescription listing functionality that allows authenticated attackers to e...
📅 12 days ago • Feb 25, 2026An SQL injection vulnerability in OpenEMR's Immunization module allows authenticated users to execute arbitrary SQL queries by manipulating patient_id...
📅 12 days ago • Feb 25, 2026This vulnerability in Cisco Catalyst SD-WAN Manager allows authenticated local users with low privileges to escalate to root privileges through the RE...
📅 13 days ago • Feb 25, 2026This vulnerability in JetBrains YouTrack allows applications to send unauthorized requests to the app permissions endpoint, potentially enabling privi...
📅 13 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the Sa...
📅 13 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fro...
📅 13 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the Nat...
📅 13 days ago • Feb 25, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats