🔥 Trending CVEs - Last 90 Days

4,509 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,271
Total CVEs Published
985
Critical Severity
3,524
High Severity
⚠️
Critical Alert
985 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2025-66953 8.8

This CSRF vulnerability in narda miteq Uplink Power Control Unit UPC2 version 1.17 allows remote attackers to trick authenticated users into executing...

📅 83 days ago • Dec 17, 2025
CVE-2025-66395 8.8

ChurchCRM versions before 6.5.3 contain a SQL injection vulnerability in the ListEvents.php file. Any authenticated user, regardless of privilege leve...

📅 83 days ago • Dec 17, 2025
CVE-2025-14765 8.8

This vulnerability is a use-after-free flaw in Chrome's WebGPU implementation that allows remote attackers to potentially exploit heap corruption. Att...

📅 84 days ago • Dec 16, 2025
CVE-2025-14766 8.8

This vulnerability allows remote attackers to exploit heap corruption through out-of-bounds read/write in Chrome's V8 JavaScript engine. Attackers can...

📅 84 days ago • Dec 16, 2025
CVE-2025-65593 8.8

nopCommerce 4.90.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in its Schedule Tasks functionality. This allows attackers to trick auth...

📅 84 days ago • Dec 16, 2025
CVE-2025-66449 8.8

CVE-2025-66449 is an arbitrary file write vulnerability in ConvertX, a self-hosted online file converter. Authenticated users can upload files with ma...

📅 85 days ago • Dec 16, 2025
CVE-2025-58173 8.8

This vulnerability in FreshRSS allows unprivileged users to perform path traversal via the language configuration parameter, enabling them to access i...

📅 85 days ago • Dec 16, 2025
CVE-2025-9121 8.8

This vulnerability allows remote code execution through deserialization of untrusted JSON data in Pentaho's Community Dashboard Editor plugin. Attacke...

📅 85 days ago • Dec 15, 2025
CVE-2023-53888 8.8

CVE-2023-53888 is a remote code execution vulnerability in Zomplog 3.9 that allows authenticated attackers to upload malicious JavaScript files, renam...

📅 85 days ago • Dec 15, 2025
CVE-2023-53875 8.8

GOM Player 2.3.90.5360 contains a remote code execution vulnerability in its Internet Explorer component that allows attackers to execute arbitrary co...

📅 85 days ago • Dec 15, 2025
CVE-2023-53868 8.8

CVE-2023-53868 is a remote code execution vulnerability in Coppermine Gallery that allows authenticated attackers to upload malicious PHP files throug...

📅 85 days ago • Dec 15, 2025
CVE-2025-66437 8.8

This CVE describes a Server-Side Template Injection (SSTI) vulnerability in Frappe ERPNext that allows authenticated attackers with Address Template p...

📅 85 days ago • Dec 15, 2025
CVE-2025-66438 8.8

This Server-Side Template Injection (SSTI) vulnerability in Frappe ERPNext allows authenticated attackers with Print Format creation/modification perm...

📅 85 days ago • Dec 15, 2025
CVE-2025-66439 8.8

This SQL injection vulnerability in Frappe ERPNext allows attackers to execute arbitrary SQL queries through the from_posting_date parameter. It enabl...

📅 85 days ago • Dec 15, 2025
CVE-2025-66440 8.8

This SQL injection vulnerability in Frappe ERPNext allows attackers to execute arbitrary SQL commands through the to_posting_date parameter. It enable...

📅 85 days ago • Dec 15, 2025
CVE-2025-66434 8.8

An authenticated attacker with Dunning Type configuration access can exploit this Server-Side Template Injection vulnerability in Frappe ERPNext to ex...

📅 85 days ago • Dec 15, 2025
CVE-2025-60786 8.8

A Zip Slip vulnerability in iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code by uploading a specially crafted Zip file. This affe...

📅 85 days ago • Dec 15, 2025
CVE-2024-44598 8.8

FNT Command 13.4.0 contains a vulnerability in its C Base Module that allows remote code execution. Attackers can upload malicious files to execute ar...

📅 85 days ago • Dec 15, 2025
CVE-2025-65780 8.8

Authenticated users in Wekan versions up to 18.15 can modify their entire user document, including organization/team memberships and account status fi...

📅 85 days ago • Dec 15, 2025
CVE-2025-14659 8.8

This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-860LB1 and DIR-868LB1 routers by injecting malicious commands i...

📅 86 days ago • Dec 14, 2025
CVE-2025-14656 8.8

A buffer overflow vulnerability in Tenda AC20 routers allows remote attackers to execute arbitrary code by manipulating schedStartTime/schedEndTime pa...

📅 86 days ago • Dec 14, 2025
CVE-2025-14655 8.8

A stack-based buffer overflow vulnerability in Tenda AC20 routers allows remote attackers to execute arbitrary code by manipulating the rebootTime par...

📅 86 days ago • Dec 14, 2025
CVE-2025-14654 8.8

This vulnerability allows remote attackers to execute arbitrary code on Tenda AC20 routers via a stack-based buffer overflow in the HTTP daemon. Attac...

📅 86 days ago • Dec 14, 2025
CVE-2025-14476 8.8

This vulnerability in the Doubly WordPress plugin allows authenticated attackers with Subscriber-level access to execute arbitrary code through PHP ob...

📅 87 days ago • Dec 13, 2025
CVE-2025-14397 8.8

The Postem Ipsum WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to c...

📅 87 days ago • Dec 13, 2025
CVE-2025-13094 8.8

The WP3D Model Import Viewer plugin for WordPress has a vulnerability that allows authenticated attackers with Author-level access or higher to upload...

📅 87 days ago • Dec 13, 2025
CVE-2025-43539 8.8

A memory corruption vulnerability in Apple operating systems allows attackers to execute arbitrary code by processing a malicious file. This affects u...

📅 88 days ago • Dec 12, 2025
CVE-2025-14572 8.8

This vulnerability allows remote attackers to execute arbitrary code or cause denial of service through memory corruption in UTT 进取 512W devices. ...

📅 88 days ago • Dec 12, 2025
CVE-2024-58305 8.8

WonderCMS 4.3.2 contains a cross-site scripting vulnerability in the module installation endpoint that allows attackers to inject malicious JavaScript...

📅 88 days ago • Dec 12, 2025
CVE-2024-58314 8.8

This CVE describes an authenticated command injection vulnerability in Atcom 100M IP Phones firmware that allows attackers with administrative credent...

📅 88 days ago • Dec 12, 2025
CVE-2025-14174 8.8

This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost Native Graphics Layer Engine) in Google Chrome on m...

📅 88 days ago • Dec 12, 2025
CVE-2025-65530 8.8

This vulnerability allows attackers to execute arbitrary code as root by exploiting an eval injection in CloudLinux ai-bolit's malware de-obfuscation ...

📅 88 days ago • Dec 12, 2025
CVE-2025-58770 8.8

CVE-2025-58770 is a BIOS vulnerability in AMI APTIOV firmware that allows local attackers to bypass permission checks and escalate privileges. This af...

📅 88 days ago • Dec 12, 2025
CVE-2025-13506 8.8

This vulnerability allows attackers with database access to execute commands with unnecessary privileges, potentially expanding control from the datab...

📅 88 days ago • Dec 12, 2025
CVE-2025-26866 8.8

This CVE describes a remote code execution vulnerability in Apache HugeGraph's PD store where a malicious Raft node can exploit insecure Hessian deser...

📅 88 days ago • Dec 12, 2025
CVE-2025-12968 8.8

The Infility Global WordPress plugin allows authenticated attackers with subscriber-level access or higher to upload arbitrary files due to missing fi...

📅 89 days ago • Dec 12, 2025
CVE-2025-12824 8.8

The Player Leaderboard WordPress plugin contains a Local File Inclusion vulnerability that allows authenticated attackers with Contributor-level acces...

📅 89 days ago • Dec 12, 2025
CVE-2025-66419 8.8

CVE-2025-66419 is a sandbox escape vulnerability in MaxKB's tool module that allows attackers to escalate privileges under concurrent conditions. This...

📅 89 days ago • Dec 11, 2025
CVE-2025-66446 8.8

CVE-2025-66446 is a privilege escalation vulnerability in MaxKB AI assistant where improper file permissions allow attackers to overwrite critical sys...

📅 89 days ago • Dec 11, 2025
CVE-2025-34506 8.8

This vulnerability allows authenticated administrators in WBCE CMS to upload malicious ZIP modules containing PHP reverse shell code, leading to remot...

📅 89 days ago • Dec 11, 2025
CVE-2024-58307 8.8

CSZCMS 1.3.0 contains an authenticated SQL injection vulnerability in the members view functionality. Authenticated attackers can inject malicious SQL...

📅 89 days ago • Dec 11, 2025
CVE-2024-58294 8.8

FreePBX 16 contains an authenticated remote code execution vulnerability in the API module. Attackers with valid session credentials can exploit the '...

📅 89 days ago • Dec 11, 2025
CVE-2024-58287 8.8

CVE-2024-58287 is an authenticated command injection vulnerability in reNgine 2.2.0 that allows attackers to execute arbitrary commands on the server....

📅 89 days ago • Dec 11, 2025
CVE-2025-66429 8.8

A directory traversal vulnerability in cPanel's Team Manager API allows attackers to overwrite arbitrary files, potentially leading to privilege escal...

📅 89 days ago • Dec 11, 2025
CVE-2025-13481 8.8

This vulnerability allows authenticated users of IBM Aspera Orchestrator to execute arbitrary commands with elevated system privileges due to improper...

📅 89 days ago • Dec 11, 2025
CVE-2025-56129 8.8

This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands via crafted P...

📅 89 days ago • Dec 11, 2025
CVE-2025-56130 8.8

This CVE describes an OS command injection vulnerability in Ruijie RG-S1930 switches that allows attackers to execute arbitrary commands via a crafted...

📅 89 days ago • Dec 11, 2025
CVE-2025-56114 8.8

This CVE describes an OS command injection vulnerability in Ruijie M18 routers that allows attackers to execute arbitrary commands on the device via a...

📅 89 days ago • Dec 11, 2025
CVE-2025-56117 8.8

This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attackers to execute arbitrary commands via a crafted P...

📅 89 days ago • Dec 11, 2025
CVE-2025-56118 8.8

This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attackers to execute arbitrary commands on the device. ...

📅 89 days ago • Dec 11, 2025

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free