🔥 Trending CVEs - Last 90 Days
4,507 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This is a reflected cross-site scripting (XSS) vulnerability in Ankara Hosting Website Design Website Software that allows attackers to inject malicio...
📅 35 days ago • Feb 3, 2026A stack-based buffer overflow vulnerability in libsoup allows remote attackers to execute arbitrary code or crash applications by sending specially cr...
📅 36 days ago • Feb 2, 2026This SQL injection vulnerability in AKCE Software's SKSPro allows attackers to execute arbitrary SQL commands on the database. All SKSPro installation...
📅 36 days ago • Feb 2, 2026CVE-2025-69662 is an SQL injection vulnerability in geopandas' to_postgis() function that allows attackers to execute arbitrary SQL commands when writ...
📅 39 days ago • Jan 30, 2026This SQL injection vulnerability in Kodmatic's Online Exam and Assessment software allows attackers to execute arbitrary SQL commands through user inp...
📅 39 days ago • Jan 30, 2026CVE-2025-57793 is a SQL injection vulnerability in Explorance Blue software that allows unauthenticated attackers to execute arbitrary database querie...
📅 41 days ago • Jan 28, 2026Python-Multipart versions before 0.0.22 contain a path traversal vulnerability when configured with UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True. Attacker...
📅 43 days ago • Jan 27, 2026This CVE describes a path traversal vulnerability in the Harmonic Design HDForms WordPress plugin, allowing attackers to delete arbitrary files on the...
📅 47 days ago • Jan 22, 2026This path traversal vulnerability in the Anona WordPress theme allows attackers to delete arbitrary files on affected systems. It affects all WordPres...
📅 47 days ago • Jan 22, 2026This path traversal vulnerability in the ovatheme Movie Booking WordPress plugin allows attackers to delete arbitrary files on the server. It affects ...
📅 47 days ago • Jan 22, 2026CVE-2025-27378 is a SQL injection vulnerability in AES software where an inactive configuration prevents proper SQL parsing. Attackers can exploit thi...
📅 48 days ago • Jan 22, 2026An unauthenticated remote attacker can exploit this vulnerability in Oracle Hospitality OPERA 5 via HTTP to access, modify, or delete sensitive data, ...
📅 49 days ago • Jan 20, 2026CVE-2026-23949 is a Zip Slip path traversal vulnerability in jaraco.context's tarball() function that allows attackers to extract files outside the in...
📅 50 days ago • Jan 20, 2026Pimcore versions before 12.3.1 and 11.5.14 store sensitive information like database passwords and session cookies in the http_error_log file, which c...
📅 54 days ago • Jan 15, 2026SumatraPDF versions 3.5.2 and earlier contain an untrusted search path vulnerability that allows arbitrary code execution. When users trigger the Adva...
📅 55 days ago • Jan 14, 2026This vulnerability allows authenticated attackers with connector management privileges to read arbitrary files and make arbitrary network requests by ...
📅 56 days ago • Jan 14, 2026This CVE describes an untrusted search path vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious...
📅 56 days ago • Jan 13, 2026This CVE describes an OS command injection vulnerability in Adobe Dreamweaver Desktop versions 21.6 and earlier. Attackers can execute arbitrary code ...
📅 56 days ago • Jan 13, 2026Adobe Dreamweaver versions 21.6 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user opens ...
📅 56 days ago • Jan 13, 2026CVE-2026-21271 is an Improper Input Validation vulnerability in Adobe Dreamweaver Desktop versions 21.6 and earlier that allows arbitrary code executi...
📅 56 days ago • Jan 13, 2026Adobe Dreamweaver versions 21.6 and earlier contain an improper input validation vulnerability that allows arbitrary file system writes when a user op...
📅 56 days ago • Jan 13, 2026This authentication bypass vulnerability in Semantic machines v5.4.8 allows attackers to access protected API endpoints without valid credentials by s...
📅 56 days ago • Jan 13, 2026This vulnerability allows authenticated attackers to execute arbitrary operating system commands by manipulating NTP configuration settings on affecte...
📅 61 days ago • Jan 9, 2026This vulnerability in libsoup's NTLM authentication handling allows attackers to cause denial-of-service crashes by sending extremely long passwords t...
📅 61 days ago • Jan 8, 2026The MoneySpace WordPress plugin exposes full payment card details including CVV codes to unauthenticated attackers. Any WordPress site using MoneySpac...
📅 63 days ago • Jan 7, 2026This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress sites using the Team plugin. Attackers can potentia...
📅 65 days ago • Jan 5, 2026The Plugin Organizer WordPress plugin before version 10.2.4 contains a SQL injection vulnerability that allows authenticated subscribers to execute ar...
📅 72 days ago • Dec 29, 2025This vulnerability is an out-of-bounds write in the ESP-IDF Bluetooth host stack that occurs when more than 32 services are discovered during Bluetoot...
📅 74 days ago • Dec 27, 2025The Eaton UPS Companion software installer fails to properly authenticate library files, allowing attackers who can modify the software package to exe...
📅 75 days ago • Dec 26, 2025This vulnerability allows attackers to inject malicious serialized objects into LangChain applications by exploiting improper escaping of user-control...
📅 77 days ago • Dec 23, 2025This vulnerability allows attackers to inject malicious objects through untrusted data deserialization in the PDF for Elementor Forms WordPress plugin...
📅 83 days ago • Dec 18, 2025This vulnerability allows attackers to escalate privileges in the Hotel Listing WordPress plugin, potentially gaining administrative access. It affect...
📅 83 days ago • Dec 18, 2025This CVE describes a Missing Authorization vulnerability in the Tyler Moore Super Blank WordPress plugin that allows unauthorized users to delete arbi...
📅 83 days ago • Dec 18, 2025This CVE describes a prototype pollution vulnerability in Vuetify's preset configuration feature. Attackers can inject malicious properties into JavaS...
📅 88 days ago • Dec 12, 2025CVE-2026-31817 is a path traversal vulnerability in OliveTin's log file creation mechanism. When the saveLogs feature is enabled, attackers can inject...
🔥 Today • Mar 10, 2026This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Plane project management software. Attackers with workspace ADMIN privileges ...
📅 4 days ago • Mar 6, 2026CVE-2026-28442 allows authenticated users to delete critical system files in ZimaOS by manipulating API requests, bypassing frontend restrictions. Thi...
📅 5 days ago • Mar 5, 2026This vulnerability allows attackers to bypass frontend restrictions and create files or directories in sensitive system locations like /etc and /usr v...
📅 8 days ago • Mar 2, 2026This vulnerability in Valkey allows malicious users to inject arbitrary data into response streams via scripting commands, potentially corrupting or t...
📅 15 days ago • Feb 23, 2026This SQL injection vulnerability in the Quiz And Survey Master WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It...
📅 18 days ago • Feb 20, 2026This Server-Side Request Forgery (SSRF) vulnerability in SillyTavern allows authenticated users to make arbitrary HTTP requests from the server and re...
📅 19 days ago • Feb 19, 2026This vulnerability in Qdrant vector database allows attackers with read-only access to append arbitrary content to files on the server via the /logger...
📅 32 days ago • Feb 6, 2026This SQL injection vulnerability in the KiviCare WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all W...
📅 35 days ago • Feb 3, 2026This vulnerability in KubeVirt Containerized Data Importer (CDI) allows authenticated users to clone PersistentVolumeClaims from namespaces they shoul...
📅 43 days ago • Jan 26, 2026This SQL injection vulnerability in FooEvents for WooCommerce allows attackers to execute arbitrary SQL commands on the database. It affects all WooCo...
📅 47 days ago • Jan 22, 2026This SQL injection vulnerability in Happy Addons for Elementor WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It...
📅 47 days ago • Jan 22, 2026This SQL injection vulnerability in the AppExperts WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all...
📅 47 days ago • Jan 22, 2026This vulnerability in Ansible Automation Platform allows read-only OAuth2 API tokens to perform unauthorized write operations on backend services like...
📅 61 days ago • Jan 8, 2026This vulnerability in Plex Media Server allows attackers to obtain permanent access tokens using transient tokens via the /myplex/account API endpoint...
📅 67 days ago • Jan 2, 2026This SQL injection vulnerability in the Mediabay WordPress plugin allows attackers to execute arbitrary SQL commands against the database. It affects ...
📅 69 days ago • Dec 31, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats