🔥 Trending CVEs - Last 90 Days
4,501 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
CVE-2025-15330 is an improper input validation vulnerability in Tanium Deploy that could allow attackers to execute arbitrary code or commands. This a...
📅 33 days ago • Feb 5, 2026An improper certificate validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows attackers on the same network segment to intercept an...
📅 33 days ago • Feb 5, 2026Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin that allows attackers to upload malicious files to web-...
📅 33 days ago • Feb 5, 2026This vulnerability allows authenticated administrators in jizhiCMS 1.6.7 to download arbitrary files from the server by exploiting the admin plugins u...
📅 33 days ago • Feb 5, 2026This CSRF vulnerability in Axigen Mail Server's WebAdmin interface allows attackers to craft malicious URLs that execute administrative actions when c...
📅 33 days ago • Feb 5, 2026This vulnerability allows a local attacker to replace service executable files or DLLs in the FREQSHIP-mini installation directory with malicious file...
📅 33 days ago • Feb 5, 2026Locutus versions 2.0.12 through 2.0.38 contain a prototype pollution vulnerability that allows attackers to modify JavaScript object prototypes via cr...
📅 34 days ago • Feb 4, 2026This vulnerability in Devtron allows any authenticated user, including low-privileged CI/CD developers, to retrieve the global API token signing key. ...
📅 34 days ago • Feb 4, 2026This CVE describes a remote code execution vulnerability in Group-Office where an authenticated attacker can execute arbitrary system commands on the ...
📅 34 days ago • Feb 4, 2026FacturaScripts contains a critical SQL injection vulnerability in the autocomplete functionality that allows authenticated attackers to extract sensit...
📅 34 days ago • Feb 4, 2026FacturaScripts contains a critical SQL injection vulnerability in its REST API that allows authenticated API users to execute arbitrary SQL queries th...
📅 34 days ago • Feb 4, 2026This path traversal vulnerability in Alist allows authenticated attackers to bypass directory-level authorization by injecting traversal sequences int...
📅 34 days ago • Feb 4, 2026OpenSTAManager versions 2.9.8 and earlier contain a SQL injection vulnerability in the ajax_complete.php endpoint. Authenticated attackers can execute...
📅 34 days ago • Feb 4, 2026OpenSTAManager versions 2.9.8 and earlier contain a SQL injection vulnerability in the Stampe Module that allows attackers to execute arbitrary SQL co...
📅 34 days ago • Feb 4, 2026This vulnerability in n8n's Merge node allows authenticated users with workflow creation/modification permissions to write arbitrary files to the serv...
📅 34 days ago • Feb 4, 2026This vulnerability in Cisco Meeting Management allows authenticated attackers with video operator privileges to upload malicious files through the web...
📅 34 days ago • Feb 4, 2026The SportsPress WordPress plugin has a Local File Inclusion vulnerability in all versions up to 2.7.26. Authenticated attackers with contributor-level...
📅 34 days ago • Feb 4, 2026This stored XSS vulnerability in Karel Electronics ViPort allows attackers to inject malicious scripts into web pages that are then executed when othe...
📅 34 days ago • Feb 4, 2026The WP FOFT Loader WordPress plugin has a vulnerability that allows authenticated attackers with Author-level access or higher to upload arbitrary fil...
📅 34 days ago • Feb 4, 2026This vulnerability in ingress-nginx allows attackers to inject malicious configuration via the auth-method annotation, leading to arbitrary code execu...
📅 35 days ago • Feb 3, 2026This CVE describes a configuration injection vulnerability in ingress-nginx where attackers can inject malicious nginx configuration through the `rule...
📅 35 days ago • Feb 3, 2026CVE-2026-24887 is a command injection vulnerability in Claude Code that allows bypassing confirmation prompts to execute arbitrary commands via the fi...
📅 35 days ago • Feb 3, 2026A heap buffer overflow vulnerability in libvpx video processing library in Google Chrome allows remote attackers to potentially execute arbitrary code...
📅 35 days ago • Feb 3, 2026A type confusion vulnerability in Chrome's V8 JavaScript engine allows attackers to corrupt heap memory via malicious web pages. This could lead to ar...
📅 35 days ago • Feb 3, 2026This CVE describes an arbitrary file upload vulnerability in FPDF's AddFont() function that allows attackers to upload malicious PHP files. Successful...
📅 35 days ago • Feb 3, 2026This vulnerability allows attackers to execute arbitrary code on WordPress sites running the vulnerable WpEvently plugin by exploiting insecure deseri...
📅 35 days ago • Feb 3, 2026The OS DataHub Maps WordPress plugin has an arbitrary file upload vulnerability that allows authenticated attackers with Author-level access or higher...
📅 35 days ago • Feb 3, 2026This vulnerability allows remote code execution in Group-Office by exploiting improper input validation in the MaintenanceController's zipLanguage act...
📅 36 days ago • Feb 2, 2026OpenClaw (formerly Clawdbot) versions prior to 2026.1.29 contain a command injection vulnerability in the Docker sandbox execution mechanism. Authenti...
📅 36 days ago • Feb 2, 2026OpenList Frontend versions before 4.1.10 contain a path traversal vulnerability in file operation handlers that allows authenticated attackers to bypa...
📅 36 days ago • Feb 2, 2026This vulnerability allows an unauthenticated remote attacker to hijack existing user sessions and gain full administrative access to affected devices....
📅 36 days ago • Feb 2, 2026This vulnerability allows local privilege escalation on macOS systems running Native Access. A low-privileged user can exploit DYLIB injection in the ...
📅 36 days ago • Feb 2, 2026In lunary-ai/lunary version 1.2.2, a privilege escalation vulnerability allows users with 'viewer' role to hijack other user accounts by obtaining pas...
📅 36 days ago • Feb 2, 2026This CVE describes a heap buffer overflow vulnerability in wlan (wireless LAN) components that allows remote attackers to execute arbitrary code witho...
📅 36 days ago • Feb 2, 2026An unauthenticated attacker can upload arbitrary files to MagicInfo9 Server, leading to remote code execution and privilege escalation. This affects M...
📅 36 days ago • Feb 2, 2026CVE-2026-24788 is an OS command injection vulnerability in RaspAP raspap-webgui that allows authenticated users to execute arbitrary commands on the u...
📅 36 days ago • Feb 2, 2026OpenClaw (also known as clawdbot or Moltbot) versions before 2026.1.29 automatically establish WebSocket connections using gatewayUrl values from quer...
📅 37 days ago • Feb 1, 2026CVE-2020-37032 is a remote code execution vulnerability in Wing FTP Server's Lua-based web console that allows authenticated attackers to execute arbi...
📅 39 days ago • Jan 30, 2026A SQL injection vulnerability in ChurchCRM allows any authenticated user, even with zero permissions, to execute arbitrary SQL commands through the Pa...
📅 39 days ago • Jan 30, 2026A remote buffer overflow vulnerability in Totolink A3600R routers allows attackers to execute arbitrary code by manipulating the apcliSsid parameter i...
📅 39 days ago • Jan 30, 2026This CVE describes a stack-based buffer overflow vulnerability in Tenda AC21 routers running firmware version 16.03.08.16. Attackers can remotely expl...
📅 40 days ago • Jan 29, 2026This vulnerability allows Creator-level users in Budibase to bypass UI restrictions and invite new users with any role (including Admin) via API manip...
📅 40 days ago • Jan 29, 2026CVE-2026-25047 is a prototype pollution vulnerability in the deephas npm package version 1.0.7 that allows attackers to modify JavaScript object proto...
📅 40 days ago • Jan 29, 2026A Server-Side Template Injection vulnerability in Amidaware Tactical RMM allows low-privileged users with Report Viewer or Report Manager permissions ...
📅 40 days ago • Jan 29, 2026This vulnerability allows authenticated attackers to exploit a buffer overflow in TP-Link VIGI C385 V1's web API due to insufficient input sanitizatio...
📅 40 days ago • Jan 29, 2026A vulnerability in the TP-Link VX800v v1.0 web interface allows attackers on the same network to brute-force weak AES encryption keys and decrypt inte...
📅 40 days ago • Jan 29, 2026This vulnerability allows authenticated users in AutoGPT Platform to execute disabled BlockInstallationBlock components, which write arbitrary Python ...
📅 40 days ago • Jan 29, 2026OpenProject versions before 16.6.6 and 17.0.2 have a command injection vulnerability that allows authenticated users with repository browsing permissi...
📅 41 days ago • Jan 28, 2026This CVE describes an out-of-bounds write vulnerability in Xen's shadow mode tracing code where guest-controlled data can be written beyond allocated ...
📅 41 days ago • Jan 28, 2026The Simple User Registration WordPress plugin allows authenticated attackers with minimal permissions (like subscribers) to escalate their privileges ...
📅 41 days ago • Jan 28, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats