🔥 Trending CVEs - Last 90 Days
4,504 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability in llama.cpp allows remote attackers to cause memory corruption by sending specially crafted JSON with negative n_discard values to...
📅 62 days ago • Jan 8, 2026A heap-buffer-overflow vulnerability in iccDEV's SIccCalcOp::Describe() function allows attackers to execute arbitrary code or cause denial of service...
📅 62 days ago • Jan 7, 2026A type confusion vulnerability in iccDEV's SIccCalcOp::ArgsPushed() function allows attackers to potentially execute arbitrary code or cause denial of...
📅 62 days ago • Jan 7, 2026A type confusion vulnerability in iccDEV's ToXmlCurve() function allows attackers to potentially execute arbitrary code or cause denial of service by ...
📅 62 days ago • Jan 7, 2026CVE-2026-21693 is a type confusion vulnerability in iccDEV's CIccSegmentedCurveXml::ToXml() function that could allow memory corruption when processin...
📅 62 days ago • Jan 7, 2026A heap-buffer-overflow vulnerability in iccDEV's CIccProfileXml::ParseBasic() function allows attackers to execute arbitrary code or cause denial of s...
📅 62 days ago • Jan 7, 2026A type confusion vulnerability in iccDEV's CIccEvalCompare::EvaluateProfile() function allows attackers to execute arbitrary code or cause denial of s...
📅 62 days ago • Jan 7, 2026This vulnerability in pnpm package manager versions 10.0.0 through 10.25 allows git-hosted dependencies to execute arbitrary code during installation....
📅 62 days ago • Jan 7, 2026CVE-2026-21682 is a heap buffer overflow vulnerability in iccDEV's CIccXmlArrayType::ParseText() function that allows attackers to execute arbitrary c...
📅 62 days ago • Jan 7, 2026This vulnerability in MicroServer allows an attacker with local network admin access and DNS manipulation capability to redirect a reverse SSH connect...
📅 62 days ago • Jan 7, 2026CVE-2026-21679 is a heap buffer overflow vulnerability in iccDEV's CIccLocalizedUnicode::GetText() function that could allow attackers to execute arbi...
📅 62 days ago • Jan 7, 2026This vulnerability allows attackers to bypass authentication on ABB WebPro SNMP Card PowerValue devices due to incorrect implementation of the authent...
📅 62 days ago • Jan 7, 2026This vulnerability allows attackers who convince users to install malicious Chrome extensions to inject scripts or HTML into privileged pages through ...
📅 62 days ago • Jan 7, 2026This vulnerability allows attackers to escalate privileges in Dasinfomedia WPCHURCH WordPress plugin, potentially gaining administrative access. It af...
📅 62 days ago • Jan 7, 2026The WP Enable WebP WordPress plugin has a vulnerability that allows authenticated attackers with Author-level permissions or higher to upload arbitrar...
📅 62 days ago • Jan 7, 2026This CVE describes an Incorrect Privilege Assignment vulnerability in two AA-Team WordPress plugins that allows attackers to escalate privileges. It a...
📅 63 days ago • Jan 6, 2026This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the DZS Video Gallery WordPress plugin. S...
📅 63 days ago • Jan 6, 2026A buffer overflow vulnerability in Tenda AC23 routers allows remote attackers to execute arbitrary code by manipulating the Time parameter in the Powe...
📅 63 days ago • Jan 6, 2026This vulnerability allows authenticated remote code execution in Craft CMS via Twig Server-Side Template Injection. Attackers with administrator acces...
📅 64 days ago • Jan 5, 2026In Coolify versions up to v4.0.0-beta.434, low-privileged users (members) can intercept and use administrator invitation links before the intended rec...
📅 64 days ago • Jan 5, 2026A command injection vulnerability in Coolify allows low-privileged users (members) to execute arbitrary system commands as root on the Coolify instanc...
📅 64 days ago • Jan 5, 2026This vulnerability allows low-privileged users in Coolify to inject malicious Docker Compose directives during project creation or updates. By mountin...
📅 64 days ago • Jan 5, 2026Muffon music streaming client versions before 2.3.0 have a one-click remote code execution vulnerability via specially crafted muffon:// links. When v...
📅 64 days ago • Jan 5, 2026An attacker on the same network can exploit a discovery protocol vulnerability in UniFi Protect Application to gain unauthorized access to UniFi Prote...
📅 64 days ago • Jan 5, 2026CVE-2025-15240 is an arbitrary file upload vulnerability in QOCA aim AI Medical Cloud Platform that allows authenticated attackers to upload malicious...
📅 64 days ago • Jan 5, 2026This vulnerability allows clients accessing Apache Kyuubi Server to bypass the server-side configuration that restricts which local directories can be...
📅 64 days ago • Jan 5, 2026A buffer overflow vulnerability in the UTT 进取 520W router firmware allows remote attackers to execute arbitrary code by exploiting the strcpy func...
📅 64 days ago • Jan 5, 2026This vulnerability is a buffer overflow in the UTT 进取 520W router firmware version 1.7.7-180627, specifically in the strcpy function handling the ...
📅 64 days ago • Jan 5, 2026A buffer overflow vulnerability in the UTT 进取 520W router firmware version 1.7.7-180627 allows remote attackers to execute arbitrary code by explo...
📅 64 days ago • Jan 5, 2026This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 520W routers by exploiting a buffer overflow in the strcpy function...
📅 64 days ago • Jan 5, 2026This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers to execute arbitrary operating system commands on a...
📅 67 days ago • Jan 3, 2026This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers to execute arbitrary operating system commands on a...
📅 67 days ago • Jan 2, 2026Bagisto eCommerce platform versions before 2.3.10 are vulnerable to server-side template injection (SSTI) through first name and last name fields. Thi...
📅 67 days ago • Jan 2, 2026This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 512W devices via a buffer overflow in the FTP server configuration ...
📅 67 days ago • Jan 2, 2026A remote buffer overflow vulnerability in UTT 进取 512W firmware version 1.7.7-171114 allows attackers to execute arbitrary code or cause denial of ...
📅 67 days ago • Jan 2, 2026This CVE describes a remote buffer overflow vulnerability in UTT 进取 512W router firmware version 1.7.7-171114. Attackers can exploit the strcpy fu...
📅 68 days ago • Jan 2, 2026CVE-2025-68700 is a critical remote code execution vulnerability in RAGFlow where authenticated low-privilege users can execute arbitrary system comma...
📅 69 days ago • Dec 31, 2025CVE-2021-47745 is an authenticated command injection vulnerability in Cypress Solutions CTM-200 firmware that allows attackers with valid credentials ...
📅 69 days ago • Dec 31, 2025This vulnerability allows authenticated attackers to execute arbitrary system commands with administrative privileges in meterN energy monitoring soft...
📅 69 days ago • Dec 31, 2025This vulnerability allows authenticated users to modify Rocket League executable files with full permissions due to insecure access controls. Attacker...
📅 69 days ago • Dec 31, 2025This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on QNO Technology VPN Firewall devices. Attack...
📅 69 days ago • Dec 31, 2025This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on QNO Technology VPN Firewall devices. Attack...
📅 69 days ago • Dec 31, 2025QNO Technology VPN Firewall devices have an insufficient entropy vulnerability that allows unauthenticated remote attackers to brute-force logged-in u...
📅 69 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SFD font files or visiting malicious web...
📅 69 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SFD font files or visiting malicious web...
📅 69 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of FontForge. Attackers can exploit this b...
📅 69 days ago • Dec 31, 2025A stack-based buffer overflow vulnerability in FontForge's PFB file parser allows remote attackers to execute arbitrary code when users open malicious...
📅 69 days ago • Dec 31, 2025A heap-based buffer overflow vulnerability in FontForge's SFD file parser allows remote attackers to execute arbitrary code when users open malicious ...
📅 69 days ago • Dec 31, 2025A heap-based buffer overflow vulnerability in FontForge's SFD file parser allows remote attackers to execute arbitrary code when users open malicious ...
📅 69 days ago • Dec 31, 2025A use-after-free vulnerability in FontForge's SFD file parser allows remote attackers to execute arbitrary code when users open malicious SFD files or...
📅 69 days ago • Dec 31, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats