🔥 Trending CVEs - Last 30 Days
1,202 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This SQL injection vulnerability in Sciyon Koyuan Thermoelectricity Heat Network Management System 3.0 allows remote attackers to execute arbitrary SQ...
📅 20 days ago • Feb 17, 2026This SQL injection vulnerability in Huace Monitoring and Early Warning System 2.2 allows remote attackers to execute arbitrary SQL commands via the ID...
📅 21 days ago • Feb 17, 2026This vulnerability in zhanghuanhao LibrarySystem allows attackers to bypass access controls in the BookController.java component, potentially enabling...
📅 22 days ago • Feb 16, 2026This vulnerability allows remote attackers to execute arbitrary operating system commands on systems running vulnerable versions of yued-fe LuLu UI. T...
📅 22 days ago • Feb 16, 2026This CVE describes a command injection vulnerability in Tosei Self-service Washing Machine software version 4.02. Attackers can remotely execute arbit...
📅 22 days ago • Feb 16, 2026This vulnerability allows remote code execution when Apache Avro Java SDK processes untrusted Avro schemas. Attackers can inject malicious code that g...
📅 25 days ago • Feb 13, 2026WWW::OAuth 1.000 and earlier for Perl uses non-cryptographically secure random number generation (rand()) for cryptographic operations, potentially al...
📅 25 days ago • Feb 13, 2026A DLL hijacking vulnerability in AMD Doc Nav software allows local attackers to escalate privileges by placing malicious DLLs in directories searched ...
📅 26 days ago • Feb 12, 2026A DLL hijacking vulnerability in AMD's Vivado design suite allows local attackers to escalate privileges by placing malicious DLLs in directories sear...
📅 27 days ago • Feb 11, 2026This vulnerability in GitLab allows an authenticated attacker to inject malicious content into the vulnerability code flow, potentially performing una...
📅 27 days ago • Feb 11, 2026Docmost versions before 0.25.0 have a stored XSS vulnerability in public share pages where page titles aren't properly HTML-escaped before insertion i...
📅 28 days ago • Feb 10, 2026A heap-based buffer overflow vulnerability in Windows Hyper-V allows authenticated attackers to execute arbitrary code on the host system. This affect...
📅 28 days ago • Feb 10, 2026This vulnerability involves a use-after-free flaw in Microsoft Graphics Component that allows an authenticated attacker to execute arbitrary code with...
📅 28 days ago • Feb 10, 2026This vulnerability in SAP BusinessObjects Business Intelligence Platform allows authenticated high-privilege attackers to insert malicious URLs that r...
📅 28 days ago • Feb 10, 2026CVE-2025-10463 is an improper authentication vulnerability in Birtech Senseway that allows attackers to bypass authentication mechanisms and gain unau...
📅 29 days ago • Feb 9, 2026CVE-2026-2225 is a SQL injection vulnerability in itsourcecode News Portal Project 1.0 that allows remote attackers to execute arbitrary SQL commands ...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID para...
📅 29 days ago • Feb 9, 2026CVE-2026-2220 is a SQL injection vulnerability in code-projects Online Reviewer System 1.0 that allows remote attackers to execute arbitrary SQL comma...
📅 29 days ago • Feb 9, 2026CVE-2026-2221 is a SQL injection vulnerability in code-projects Online Reviewer System 1.0 that allows remote attackers to execute arbitrary SQL comma...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in itsourcecode Event Management System 1.0 allows attackers to execute arbitrary SQL commands via the ID parameter i...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Music Site 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter...
📅 29 days ago • Feb 9, 2026CVE-2026-2212 is a SQL injection vulnerability in code-projects Online Music Site 1.0 that allows remote attackers to execute arbitrary SQL commands v...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows attackers to manipulate database queries through the difficulty_id...
📅 29 days ago • Feb 9, 2026This CVE describes a SQL injection vulnerability in code-projects Online Reviewer System 1.0. Attackers can remotely exploit the user-delete.php file ...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows attackers to manipulate database queries through the test_id param...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows remote attackers to execute arbitrary SQL commands via the test_id...
📅 29 days ago • Feb 9, 2026This SQL injection vulnerability in code-projects Online Reviewer System 1.0 allows attackers to manipulate database queries through the ID parameter ...
📅 29 days ago • Feb 9, 2026CVE-2026-2190 is a SQL injection vulnerability in itsourcecode School Management System 1.0 that allows remote attackers to execute arbitrary SQL comm...
📅 29 days ago • Feb 8, 2026CVE-2026-2189 is a SQL injection vulnerability in itsourcecode School Management System 1.0 that allows remote attackers to execute arbitrary SQL comm...
📅 29 days ago • Feb 8, 2026This CVE describes an OS command injection vulnerability in the Great Developers Certificate Generation System that allows remote attackers to execute...
📅 29 days ago • Feb 8, 2026The WP App Bar WordPress plugin has a stored XSS vulnerability that allows unauthenticated attackers to inject malicious scripts into plugin settings....
📅 3 days ago • Mar 7, 2026The Meta Box WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Contributor-level access or higher...
📅 3 days ago • Mar 7, 2026The Easy PHP Settings WordPress plugin allows authenticated attackers with Administrator privileges to inject arbitrary PHP code into wp-config.php vi...
📅 3 days ago • Mar 7, 2026Chartbrew versions before 4.8.1 contain a remote code execution vulnerability in MongoDB dataset queries. Attackers can execute arbitrary code on the ...
📅 4 days ago • Mar 6, 2026A remote stack-based buffer overflow vulnerability in Wavlink WL-NU516U1 router's login.cgi component allows attackers to execute arbitrary code by ma...
📅 4 days ago • Mar 6, 2026This CVE describes a command injection vulnerability in Wavlink WL-NU516U1 routers that allows remote attackers to execute arbitrary commands on affec...
📅 4 days ago • Mar 6, 2026The Fluent Forms Pro WordPress plugin has a stored XSS vulnerability that allows unauthenticated attackers to inject malicious scripts into draft form...
📅 5 days ago • Mar 5, 2026This vulnerability allows authenticated local administrators in one context of Cisco ASA multi-context mode to copy files to/from other contexts via S...
📅 6 days ago • Mar 4, 2026This Server-Side Request Forgery (SSRF) vulnerability in the PostX WordPress plugin allows authenticated attackers with Administrator privileges to ma...
📅 6 days ago • Mar 4, 2026The WPBookit WordPress plugin has a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts into w...
📅 6 days ago • Mar 4, 2026Multiple authenticated OS command injection vulnerabilities in Cohesity TranZman 4.0 allow authenticated admin users to execute arbitrary commands wit...
📅 7 days ago • Mar 3, 2026This vulnerability allows attackers to escalate privileges to root and read/write arbitrary files on Cohesity TranZman Migration Appliance systems due...
📅 7 days ago • Mar 3, 2026CVE-2025-63911 is an authenticated command injection vulnerability in Cohesity TranZman Migration Appliance Release 4.0 Build 14614. This allows authe...
📅 7 days ago • Mar 3, 2026This vulnerability allows authenticated WordPress administrators to perform server-side request forgery (SSRF) attacks via the Uncanny Automator plugi...
📅 7 days ago • Mar 3, 2026This vulnerability in Vikunja allows attackers to overwrite arbitrary files on the host system by uploading a malicious ZIP archive during configurati...
📅 12 days ago • Feb 25, 2026This vulnerability allows attackers to bypass Coturn's IP address restrictions by using IPv4-mapped IPv6 addresses. Attackers can send CreatePermissio...
📅 13 days ago • Feb 25, 2026This CVE describes a post-authentication command injection vulnerability in Zyxel VMG3625-T50B devices. An authenticated attacker with administrator p...
📅 14 days ago • Feb 24, 2026A buffer overflow vulnerability in the UTT HiPER 810G router's administrative interface allows remote attackers to execute arbitrary code by manipulat...
📅 15 days ago • Feb 23, 2026This CVE describes a remote buffer overflow vulnerability in UTT HiPER 810G routers. Attackers can exploit the strcpy function in the ConfigExceptMSN ...
📅 16 days ago • Feb 22, 2026This vulnerability in Moodle's backup restore functionality allows authenticated privileged users to upload specially crafted backup files that bypass...
📅 17 days ago • Feb 21, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats