🔥 Trending CVEs - Last 90 Days
4,512 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attackers to execute arbitrary commands on the device. ...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attackers to execute arbitrary commands on the device. ...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-EW1800GX PRO wireless access points. Attackers can execute arbitrary commands on...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-EW1200G PRO wireless access points. Attackers can execute arbitrary commands on ...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-BCR600W routers that allows attackers to execute arbitrary commands via crafted ...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attackers to execute arbitrary commands on the device v...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands on the device...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands via a crafted...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows attackers to execute arbitrary commands on the device...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-YST EST devices that allows attackers to execute arbitrary commands via a crafte...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie RG-YST access points that allows attackers to execute arbitrary commands on the dev...
📅 89 days ago • Dec 11, 2025This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attackers to execute arbitrary commands on the device. ...
📅 89 days ago • Dec 11, 2025A buffer overflow vulnerability in Tenda CH22 router firmware version 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'p...
📅 89 days ago • Dec 11, 2025This vulnerability allows attackers to bypass authentication in HYPR Server by spoofing identities, potentially gaining unauthorized access to systems...
📅 89 days ago • Dec 11, 2025This vulnerability allows attackers to bypass file integrity validation in TeamViewer DEX Client's Content Distribution Service by providing a valid h...
📅 89 days ago • Dec 11, 2025This vulnerability allows authenticated attackers to upload malicious SVG files and create hotlinks that execute stored cross-site scripting (XSS) att...
📅 5 days ago • Mar 6, 2026This stored XSS vulnerability in Gogs allows authenticated users to inject malicious JavaScript via data: URIs in comments and issue descriptions. The...
📅 5 days ago • Mar 5, 2026A stored cross-site scripting vulnerability in OpenEMR's GAD-7 anxiety assessment form allows authenticated clinicians to inject malicious JavaScript....
📅 14 days ago • Feb 25, 2026Authenticated users in Traccar GPS tracking system can upload malicious SVG files containing JavaScript, which executes in other users' browsers when ...
📅 15 days ago • Feb 23, 2026A stored cross-site scripting (XSS) vulnerability in Statmatic CMS allows authenticated users with content creation permissions to inject malicious Ja...
📅 27 days ago • Feb 11, 2026Authenticated students can inject malicious JavaScript into uploaded assignment files in Open eClass platform. When instructors view these submissions...
📅 35 days ago • Feb 3, 2026This vulnerability allows users in the 'incus' group to inject newlines into container environment variables, enabling arbitrary command execution on ...
📅 47 days ago • Jan 22, 2026This vulnerability in Incus allows users with container launch privileges to exploit directory traversal or symbolic links in template functionality, ...
📅 47 days ago • Jan 22, 2026OpenProject versions 16.3.0 through 16.6.4 have a stored cross-site scripting vulnerability in the Roadmap view that allows attackers to inject malici...
📅 50 days ago • Jan 19, 2026This is a stored cross-site scripting (XSS) vulnerability in ConnectWise PSA's Time Entry Audit Trail feature. Attackers can inject malicious scripts ...
📅 53 days ago • Jan 16, 2026LaSuite Doc versions 3.8.0 to 4.3.0 contain a stored XSS vulnerability in the Interlinking feature. Attackers with document editing privileges can inj...
📅 54 days ago • Jan 15, 2026This vulnerability allows an authenticated user to inject malicious scripts into GitLab's Markdown rendering, which then executes in other users' brow...
📅 61 days ago • Jan 9, 2026This stored cross-site scripting (XSS) vulnerability in phpgurukul Hostel Management System v2.1 allows attackers to inject malicious scripts into com...
📅 61 days ago • Jan 8, 2026A stored XSS vulnerability in TrueConf Server v5.5.2.10813 allows attackers to inject malicious scripts via the meeting location field. When users vie...
📅 70 days ago • Dec 30, 2025A misconfigured proxy in runtimes-inventory-rhel8-operator attaches cluster administrative credentials to all commands instead of only authorized repo...
📅 85 days ago • Dec 15, 2025CVE-2026-21333 is an untrusted search path vulnerability in Adobe Illustrator that could allow attackers to execute arbitrary code with the current us...
🔥 Today • Mar 10, 2026This vulnerability in OneUptime allows attackers to hijack GitHub App installations and manipulate project repositories without proper authorization. ...
🔥 Today • Mar 10, 2026This vulnerability in nltk's filestring() function allows attackers to read arbitrary files on the system by providing malicious file paths. It affect...
⚡ Yesterday • Mar 9, 2026CVE-2026-28679 is a path traversal vulnerability in Home-Gallery.org that allows attackers to download sensitive system files outside the intended med...
📅 5 days ago • Mar 6, 2026This vulnerability allows attackers to elevate privileges in Payment Orchestrator Service, potentially gaining unauthorized access to payment processi...
📅 5 days ago • Mar 5, 2026This vulnerability in NLTK allows attackers to read arbitrary files on the server through path traversal attacks in multiple CorpusReader classes. It ...
📅 6 days ago • Mar 4, 2026An unauthenticated remote attacker can send crafted packets to Cisco ASA/FTD Remote Access SSL VPN servers to exhaust device memory, causing denial of...
📅 6 days ago • Mar 4, 2026An unauthenticated remote attacker can cause Cisco ASA/FTD firewall devices to reload by sending crafted HTTP requests to the VPN web server, resultin...
📅 6 days ago • Mar 4, 2026This SSRF vulnerability in changedetection.io allows authenticated users (or any user when no password is configured, which is the default) to make th...
📅 14 days ago • Feb 25, 2026ImageMagick's path security policy enforcement occurs before filesystem path resolution, allowing path traversal attacks to bypass policy rules like '...
📅 15 days ago • Feb 24, 2026This SSRF vulnerability in Astro web framework allows attackers to redirect error page requests to internal network resources by manipulating the Host...
📅 15 days ago • Feb 24, 2026This path traversal vulnerability in the WordPress 'Upload Files Anywhere' plugin allows attackers to delete arbitrary files on the server. It affects...
📅 18 days ago • Feb 20, 2026This vulnerability allows unauthenticated attackers to abuse the ShopLentor WordPress plugin as an email relay. Attackers can send arbitrary emails wi...
📅 21 days ago • Feb 18, 2026This SQL injection vulnerability in Tumeva News Software allows attackers to execute arbitrary SQL commands on the database. All users running affecte...
📅 21 days ago • Feb 17, 2026An authentication bypass vulnerability in Ivanti Endpoint Manager allows remote unauthenticated attackers to access stored credential data. This affec...
📅 28 days ago • Feb 10, 2026This reflected XSS vulnerability in Zirve Information Technologies' e-Taxpayer Accounting Website allows attackers to inject malicious scripts into we...
📅 30 days ago • Feb 9, 2026Calibre e-book manager versions before 9.2.0 contain a path traversal vulnerability in the CHM reader that allows attackers to write arbitrary files a...
📅 32 days ago • Feb 6, 2026This SSRF vulnerability in Pydantic AI allows attackers to make the server request internal network resources when applications accept message history...
📅 32 days ago • Feb 6, 2026This Azure Arc vulnerability allows authenticated attackers to elevate privileges within managed systems, potentially gaining administrative control. ...
📅 33 days ago • Feb 5, 2026CVE-2025-13379 is a SQL injection vulnerability in IBM Aspera Console versions 3.4.0 through 3.4.8 that allows remote attackers to execute arbitrary S...
📅 33 days ago • Feb 5, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats