🔥 Trending CVEs - Last 30 Days
1,198 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability in the BackWPup WordPress plugin allows authenticated attackers with subscriber-level access or higher to modify WordPress site opt...
📅 19 days ago • Feb 19, 2026This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'wpcr3_fname' parameter in the WP Customer Reviews WordPress p...
📅 19 days ago • Feb 19, 2026This vulnerability allows authenticated attackers with Shop Manager or higher WordPress roles to install arbitrary plugins via the CTX Feed plugin. Th...
📅 19 days ago • Feb 19, 2026This CVE describes a remote command injection vulnerability in Advantech WISE-6610 devices. Attackers can execute arbitrary operating system commands ...
📅 19 days ago • Feb 18, 2026MajorDoMo contains an unauthenticated stored XSS vulnerability that allows attackers to inject malicious JavaScript into property values. When adminis...
📅 19 days ago • Feb 18, 2026This vulnerability allows authenticated attackers with Shop Manager or higher WordPress roles to execute arbitrary PHP code on the server. The flaw ex...
📅 20 days ago • Feb 18, 2026The Rent Fetch WordPress plugin contains a stored cross-site scripting (XSS) vulnerability in the 'keyword' parameter that allows unauthenticated atta...
📅 20 days ago • Feb 18, 2026This CVE-2026-2615 is a command injection vulnerability in Wavlink WL-NU516U1 routers that allows remote attackers to execute arbitrary commands on af...
📅 21 days ago • Feb 17, 2026The RSS Aggregator WordPress plugin is vulnerable to reflected cross-site scripting (XSS) via the 'template' parameter. Unauthenticated attackers can ...
📅 21 days ago • Feb 17, 2026A remote stack-based buffer overflow vulnerability exists in Wavlink WL-NU516U1 routers through firmware version 130/260. Attackers can exploit this b...
📅 22 days ago • Feb 16, 2026This stored XSS vulnerability in Smoothwall Express allows attackers to inject malicious JavaScript through modem.cgi POST parameters. When users acce...
📅 22 days ago • Feb 16, 2026This stored and reflected XSS vulnerability in Smoothwall Express allows attackers to inject malicious JavaScript via the urlfilter.cgi endpoint. When...
📅 22 days ago • Feb 16, 2026This cross-site scripting (XSS) vulnerability in SmarterMail allows attackers to inject malicious scripts via MAPI requests. It affects organizations ...
📅 22 days ago • Feb 16, 2026The Super Page Cache WordPress plugin has a stored cross-site scripting vulnerability in its Activity Log feature. Unauthenticated attackers can injec...
📅 24 days ago • Feb 14, 2026The User Language Switch WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated administrators to make...
📅 24 days ago • Feb 14, 2026This vulnerability allows unauthenticated attackers to execute arbitrary JavaScript in victims' browsers via the 'sscf_name' parameter in the Super Si...
📅 24 days ago • Feb 14, 2026The PixelYourSite WordPress plugin is vulnerable to stored cross-site scripting (XSS) via insufficient input sanitization in the 'pysTrafficSource' an...
📅 24 days ago • Feb 13, 2026The Secure Copy Content Protection and Content Locking WordPress plugin is vulnerable to stored cross-site scripting (XSS) via the 'X-Forwarded-For' H...
📅 26 days ago • Feb 12, 2026This stored XSS vulnerability in the Customer Reviews for WooCommerce WordPress plugin allows attackers to inject malicious scripts into web pages via...
📅 26 days ago • Feb 12, 2026The iONE360 configurator WordPress plugin has a stored XSS vulnerability in its contact form parameters that allows unauthenticated attackers to injec...
📅 27 days ago • Feb 11, 2026The Lucky Wheel Giveaway WordPress plugin contains a remote code execution vulnerability in all versions up to 1.0.22. Authenticated attackers with Ad...
📅 27 days ago • Feb 11, 2026The Name Directory WordPress plugin has a stored XSS vulnerability that allows unauthenticated attackers to inject malicious scripts via public submis...
📅 28 days ago • Feb 10, 2026This CVE describes a remote command injection vulnerability in D-Link DCS-931L IP cameras. Attackers can execute arbitrary operating system commands b...
📅 28 days ago • Feb 10, 2026This vulnerability allows authenticated attackers with Shop Manager or higher privileges in WordPress to modify arbitrary site options due to missing ...
📅 28 days ago • Feb 10, 2026CVE-2026-25951 is a path traversal vulnerability in FUXA web-based SCADA/HMI software that allows authenticated administrators to bypass directory pro...
📅 28 days ago • Feb 9, 2026This is a Remote Code Execution vulnerability in Craft CMS that allows authenticated administrators to execute arbitrary system commands on the server...
📅 29 days ago • Feb 9, 2026This CVE describes a remote command injection vulnerability in D-Link DIR-823X routers. Attackers can execute arbitrary operating system commands by m...
📅 29 days ago • Feb 9, 2026A stack-based buffer overflow vulnerability exists in Tenda AC9 routers running firmware version 15.03.06.42_multi. Remote attackers can exploit this ...
📅 29 days ago • Feb 8, 2026This CVE describes a stack-based buffer overflow vulnerability in Tenda AC9 routers' formGetRebootTimer function. Attackers can exploit this remotely ...
📅 29 days ago • Feb 8, 2026This vulnerability allows remote attackers to execute arbitrary operating system commands on UTT 进取 521G devices through command injection in the ...
📅 29 days ago • Feb 8, 2026A privilege escalation vulnerability in SiYuan Note's publish service allows authenticated users with read-only publish accounts (RoleReader) to modif...
🔥 Today • Mar 10, 2026A stack buffer overflow vulnerability in ImageMagick's morphology kernel parsing functions allows attackers to corrupt the stack by providing speciall...
🔥 Today • Mar 10, 2026This vulnerability in pyLoad allows attackers to bypass directory traversal protections in the edit_package() function using recursive path sequences ...
📅 3 days ago • Mar 7, 2026Facturation System 1.0 contains an SQL injection vulnerability in the editar_producto.php endpoint that allows authenticated attackers to execute arbi...
📅 4 days ago • Mar 6, 2026Maitra 1.7.2 contains an SQL injection vulnerability in the mailid parameter of outmail and inmail modules, allowing authenticated attackers to execut...
📅 4 days ago • Mar 6, 2026Galaxy Forces MMORPG 0.5.8 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries through the 't...
📅 4 days ago • Mar 6, 2026This vulnerability involves default credentials for a local privileged user in Acronis Cyber Protect virtual appliances. Attackers can gain administra...
📅 4 days ago • Mar 6, 2026OpenClaw versions before 2026.2.12 have a path traversal vulnerability where authenticated attackers can use unsanitized sessionId or sessionFile para...
📅 4 days ago • Mar 5, 2026OpenClaw versions before 2026.2.14 have an OAuth state validation bypass in the manual Chutes login flow that allows attackers to bypass CSRF protecti...
📅 4 days ago • Mar 5, 2026OpenClaw versions before 2026.2.12 have an arbitrary file write vulnerability where authenticated gateway clients can manipulate the sessionFile path ...
📅 4 days ago • Mar 5, 2026This vulnerability in Frappe framework allows authenticated users to share documents with permissions they don't possess, potentially granting unautho...
📅 5 days ago • Mar 5, 2026This CVE describes an improper verification vulnerability in Huawei email applications that could allow attackers to access sensitive information. The...
📅 5 days ago • Mar 5, 2026CVE-2019-25503 is an unauthenticated SQL injection vulnerability in PHPads 2.0 that allows attackers to execute arbitrary SQL queries through the bann...
📅 6 days ago • Mar 4, 2026Tradebox 5.4 contains an SQL injection vulnerability in the monthly_deposit endpoint's symbol parameter that allows authenticated attackers to execute...
📅 6 days ago • Mar 4, 2026This XML External Entity (XXE) vulnerability in IBM InfoSphere Information Server allows attackers to read sensitive files from the server by exploiti...
📅 7 days ago • Mar 3, 2026This vulnerability allows authenticated local users in ZimaOS to craft requests targeting internal IP addresses and services, potentially accessing HT...
📅 8 days ago • Mar 2, 2026This cryptographic vulnerability in Qualcomm chipsets allows the High-Level Operating System (HLOS) to access the boot loader's certificate chain thro...
📅 8 days ago • Mar 2, 2026Zed code editor versions before 0.225.9 have a symlink escape vulnerability that allows reading and writing files outside the project directory when s...
📅 12 days ago • Feb 26, 2026A heap buffer overflow vulnerability in iccDEV allows reading past allocated memory boundaries when parsing ICC profile XML text description tags. Thi...
📅 13 days ago • Feb 25, 2026A local privilege escalation vulnerability in udisks allows unprivileged users to trigger the root-owned daemon to overwrite LUKS encryption headers. ...
📅 13 days ago • Feb 25, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats