🔥 Trending CVEs - Last 90 Days

4,507 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,262
Total CVEs Published
985
Critical Severity
3,522
High Severity
⚠️
Critical Alert
985 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2025-6397 8.6

This is a reflected cross-site scripting (XSS) vulnerability in Ankara Hosting Website Design Website Software that allows attackers to inject malicio...

📅 35 days ago • Feb 3, 2026
CVE-2026-1761 8.6

A stack-based buffer overflow vulnerability in libsoup allows remote attackers to execute arbitrary code or crash applications by sending specially cr...

📅 36 days ago • Feb 2, 2026
CVE-2025-8587 8.6

This SQL injection vulnerability in AKCE Software's SKSPro allows attackers to execute arbitrary SQL commands on the database. All SKSPro installation...

📅 36 days ago • Feb 2, 2026
CVE-2025-69662 8.6

CVE-2025-69662 is an SQL injection vulnerability in geopandas' to_postgis() function that allows attackers to execute arbitrary SQL commands when writ...

📅 39 days ago • Jan 30, 2026
CVE-2025-4686 8.6

This SQL injection vulnerability in Kodmatic's Online Exam and Assessment software allows attackers to execute arbitrary SQL commands through user inp...

📅 39 days ago • Jan 30, 2026
CVE-2025-57793 8.6

CVE-2025-57793 is a SQL injection vulnerability in Explorance Blue software that allows unauthenticated attackers to execute arbitrary database querie...

📅 41 days ago • Jan 28, 2026
CVE-2026-24486 8.6

Python-Multipart versions before 0.0.22 contain a path traversal vulnerability when configured with UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True. Attacker...

📅 43 days ago • Jan 27, 2026
CVE-2025-68912 8.6

This CVE describes a path traversal vulnerability in the Harmonic Design HDForms WordPress plugin, allowing attackers to delete arbitrary files on the...

📅 47 days ago • Jan 22, 2026
CVE-2025-68901 8.6

This path traversal vulnerability in the Anona WordPress theme allows attackers to delete arbitrary files on affected systems. It affects all WordPres...

📅 47 days ago • Jan 22, 2026
CVE-2025-67963 8.6

This path traversal vulnerability in the ovatheme Movie Booking WordPress plugin allows attackers to delete arbitrary files on the server. It affects ...

📅 47 days ago • Jan 22, 2026
CVE-2025-27378 8.6

CVE-2025-27378 is a SQL injection vulnerability in AES software where an inactive configuration prevents proper SQL parsing. Attackers can exploit thi...

📅 48 days ago • Jan 22, 2026
CVE-2026-21967 8.6

An unauthenticated remote attacker can exploit this vulnerability in Oracle Hospitality OPERA 5 via HTTP to access, modify, or delete sensitive data, ...

📅 49 days ago • Jan 20, 2026
CVE-2026-23949 8.6

CVE-2026-23949 is a Zip Slip path traversal vulnerability in jaraco.context's tarball() function that allows attackers to extract files outside the in...

📅 50 days ago • Jan 20, 2026
CVE-2026-23493 8.6

Pimcore versions before 12.3.1 and 11.5.14 store sensitive information like database passwords and session cookies in the http_error_log file, which c...

📅 54 days ago • Jan 15, 2026
CVE-2026-23512 8.6

SumatraPDF versions 3.5.2 and earlier contain an untrusted search path vulnerability that allows arbitrary code execution. When users trigger the Adva...

📅 55 days ago • Jan 14, 2026
CVE-2026-0532 8.6

This vulnerability allows authenticated attackers with connector management privileges to read arbitrary files and make arbitrary network requests by ...

📅 56 days ago • Jan 14, 2026
CVE-2026-21280 8.6

This CVE describes an untrusted search path vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious...

📅 56 days ago • Jan 13, 2026
CVE-2026-21267 8.6

This CVE describes an OS command injection vulnerability in Adobe Dreamweaver Desktop versions 21.6 and earlier. Attackers can execute arbitrary code ...

📅 56 days ago • Jan 13, 2026
CVE-2026-21268 8.6

Adobe Dreamweaver versions 21.6 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user opens ...

📅 56 days ago • Jan 13, 2026
CVE-2026-21271 8.6

CVE-2026-21271 is an Improper Input Validation vulnerability in Adobe Dreamweaver Desktop versions 21.6 and earlier that allows arbitrary code executi...

📅 56 days ago • Jan 13, 2026
CVE-2026-21272 8.6

Adobe Dreamweaver versions 21.6 and earlier contain an improper input validation vulnerability that allows arbitrary file system writes when a user op...

📅 56 days ago • Jan 13, 2026
CVE-2025-66698 8.6

This authentication bypass vulnerability in Semantic machines v5.4.8 allows attackers to access protected API endpoints without valid credentials by s...

📅 56 days ago • Jan 13, 2026
CVE-2025-64091 8.6

This vulnerability allows authenticated attackers to execute arbitrary operating system commands by manipulating NTP configuration settings on affecte...

📅 61 days ago • Jan 9, 2026
CVE-2026-0719 8.6

This vulnerability in libsoup's NTLM authentication handling allows attackers to cause denial-of-service crashes by sending extremely long passwords t...

📅 61 days ago • Jan 8, 2026
CVE-2025-13371 8.6

The MoneySpace WordPress plugin exposes full payment card details including CVV codes to unauthenticated attackers. Any WordPress site using MoneySpac...

📅 63 days ago • Jan 7, 2026
CVE-2025-14124 8.6

This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress sites using the Team plugin. Attackers can potentia...

📅 65 days ago • Jan 5, 2026
CVE-2025-13417 8.6

The Plugin Organizer WordPress plugin before version 10.2.4 contains a SQL injection vulnerability that allows authenticated subscribers to execute ar...

📅 72 days ago • Dec 29, 2025
CVE-2025-68473 8.6

This vulnerability is an out-of-bounds write in the ESP-IDF Bluetooth host stack that occurs when more than 32 services are discovered during Bluetoot...

📅 74 days ago • Dec 27, 2025
CVE-2025-59887 8.6

The Eaton UPS Companion software installer fails to properly authenticate library files, allowing attackers who can modify the software package to exe...

📅 75 days ago • Dec 26, 2025
CVE-2025-68665 8.6

This vulnerability allows attackers to inject malicious serialized objects into LangChain applications by exploiting improper escaping of user-control...

📅 77 days ago • Dec 23, 2025
CVE-2025-60084 8.6

This vulnerability allows attackers to inject malicious objects through untrusted data deserialization in the PDF for Elementor Forms WordPress plugin...

📅 83 days ago • Dec 18, 2025
CVE-2025-58710 8.6

This vulnerability allows attackers to escalate privileges in the Hotel Listing WordPress plugin, potentially gaining administrative access. It affect...

📅 83 days ago • Dec 18, 2025
CVE-2025-54741 8.6

This CVE describes a Missing Authorization vulnerability in the Tyler Moore Super Blank WordPress plugin that allows unauthorized users to delete arbi...

📅 83 days ago • Dec 18, 2025
CVE-2025-8083 8.6

This CVE describes a prototype pollution vulnerability in Vuetify's preset configuration feature. Attackers can inject malicious properties into JavaS...

📅 88 days ago • Dec 12, 2025
CVE-2026-31817 8.5

CVE-2026-31817 is a path traversal vulnerability in OliveTin's log file creation mechanism. When the saveLogs feature is enabled, attackers can inject...

🔥 Today • Mar 10, 2026
CVE-2026-30242 8.5

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Plane project management software. Attackers with workspace ADMIN privileges ...

📅 4 days ago • Mar 6, 2026
CVE-2026-28442 8.5

CVE-2026-28442 allows authenticated users to delete critical system files in ZimaOS by manipulating API requests, bypassing frontend restrictions. Thi...

📅 5 days ago • Mar 5, 2026
CVE-2026-28286 8.5

This vulnerability allows attackers to bypass frontend restrictions and create files or directories in sensitive system locations like /etc and /usr v...

📅 8 days ago • Mar 2, 2026
CVE-2025-67733 8.5

This vulnerability in Valkey allows malicious users to inject arbitrary data into response streams via scripting commands, potentially corrupting or t...

📅 15 days ago • Feb 23, 2026
CVE-2025-67987 8.5

This SQL injection vulnerability in the Quiz And Survey Master WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It...

📅 18 days ago • Feb 20, 2026
CVE-2026-26286 8.5

This Server-Side Request Forgery (SSRF) vulnerability in SillyTavern allows authenticated users to make arbitrary HTTP requests from the server and re...

📅 19 days ago • Feb 19, 2026
CVE-2026-25628 8.5

This vulnerability in Qdrant vector database allows attackers with read-only access to append arbitrary content to files on the server via the /logger...

📅 32 days ago • Feb 6, 2026
CVE-2026-25022 8.5

This SQL injection vulnerability in the KiviCare WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all W...

📅 35 days ago • Feb 3, 2026
CVE-2025-14459 8.5

This vulnerability in KubeVirt Containerized Data Importer (CDI) allows authenticated users to clone PersistentVolumeClaims from namespaces they shoul...

📅 43 days ago • Jan 26, 2026
CVE-2025-69045 8.5

This SQL injection vulnerability in FooEvents for WooCommerce allows attackers to execute arbitrary SQL commands on the database. It affects all WooCo...

📅 47 days ago • Jan 22, 2026
CVE-2025-68999 8.5

This SQL injection vulnerability in Happy Addons for Elementor WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It...

📅 47 days ago • Jan 22, 2026
CVE-2025-68881 8.5

This SQL injection vulnerability in the AppExperts WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It affects all...

📅 47 days ago • Jan 22, 2026
CVE-2025-14025 8.5

This vulnerability in Ansible Automation Platform allows read-only OAuth2 API tokens to perform unauthorized write operations on backend services like...

📅 61 days ago • Jan 8, 2026
CVE-2025-69414 8.5

This vulnerability in Plex Media Server allows attackers to obtain permanent access tokens using transient tokens via the /myplex/account API endpoint...

📅 67 days ago • Jan 2, 2026
CVE-2025-28949 8.5

This SQL injection vulnerability in the Mediabay WordPress plugin allows attackers to execute arbitrary SQL commands against the database. It affects ...

📅 69 days ago • Dec 31, 2025

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free