🔥 Trending CVEs - Last 90 Days

4,489 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,226
Total CVEs Published
986
Critical Severity
3,503
High Severity
⚠️
Critical Alert
986 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2026-28710 8.1

CVE-2026-28710 allows attackers to access and manipulate sensitive information in Acronis Cyber Protect 17 due to improper authentication. This affect...

📅 5 days ago • Mar 6, 2026
CVE-2026-28472 8.1

OpenClaw versions before 2026.2.2 have an authentication bypass vulnerability in the WebSocket gateway connection handshake. Attackers can connect wit...

📅 5 days ago • Mar 5, 2026
CVE-2026-28447 8.1

OpenClaw versions 2026.1.29-beta.1 through 2026.2.1 contain a path traversal vulnerability in plugin installation. Attackers can craft malicious plugi...

📅 5 days ago • Mar 5, 2026
CVE-2026-1321 8.1

This vulnerability in the WordPress Restrict Content plugin allows unauthenticated attackers to register with any membership level, including inactive...

📅 6 days ago • Mar 5, 2026
CVE-2026-20002 8.1

This SQL injection vulnerability in Cisco Secure FMC's web management interface allows authenticated attackers to execute arbitrary SQL commands. Atta...

📅 7 days ago • Mar 4, 2026
CVE-2026-20777 8.1

A heap-based buffer overflow vulnerability in libbiosig's Nicolet WFT file parser allows arbitrary code execution when processing malicious .wft files...

📅 8 days ago • Mar 3, 2026
CVE-2026-1779 8.1

This vulnerability allows unauthenticated attackers to bypass authentication in WordPress sites using the User Registration & Membership plugin. Attac...

📅 13 days ago • Feb 26, 2026
CVE-2026-3172 8.1

A buffer overflow vulnerability in the parallel HNSW index build functionality of pgvector allows authenticated database users to read sensitive data ...

📅 13 days ago • Feb 25, 2026
CVE-2026-25136 8.1

This is a reflected Cross-site Scripting (XSS) vulnerability in Rucio's WebUI that allows attackers to steal login session tokens. Attackers can craft...

📅 13 days ago • Feb 25, 2026
CVE-2026-22719 8.1

CVE-2026-22719 is a command injection vulnerability in VMware Aria Operations that allows unauthenticated attackers to execute arbitrary commands duri...

📅 13 days ago • Feb 25, 2026
CVE-2026-24890 8.1

OpenEMR patient portal users can forge provider signatures by exploiting an authorization bypass in the signature upload endpoint. This affects all Op...

📅 14 days ago • Feb 25, 2026
CVE-2026-3179 8.1

This path traversal vulnerability in ASUSTOR ADM FTP Backup allows attackers to access files outside the intended directory by manipulating file paths...

📅 14 days ago • Feb 25, 2026
CVE-2026-27607 8.1

This vulnerability in RustFS allows attackers to bypass upload policy restrictions in presigned POST uploads, enabling unauthorized file uploads that ...

📅 14 days ago • Feb 25, 2026
CVE-2025-67752 8.1

OpenEMR versions before 7.0.4 have disabled SSL/TLS certificate verification by default in their HTTP client, making all HTTPS connections vulnerable ...

📅 14 days ago • Feb 25, 2026
CVE-2026-2459 8.1

An authenticated user with Installer role in REB500 can access and modify directories they are not authorized to access. This privilege escalation vul...

📅 15 days ago • Feb 24, 2026
CVE-2026-27206 8.1

Zumba Json Serializer versions 3.2.2 and below allow PHP Object Injection through untrusted JSON deserialization. The library's @type field can instan...

📅 18 days ago • Feb 21, 2026
CVE-2026-27196 8.1

This stored cross-site scripting (XSS) vulnerability in Statmatic CMS allows authenticated users with field management permissions to inject malicious...

📅 18 days ago • Feb 21, 2026
CVE-2026-27192 8.1

FeathersJS versions 5.0.39 and below have an origin validation vulnerability where the getAllowedOrigin() function uses startsWith() for comparison, a...

📅 18 days ago • Feb 21, 2026
CVE-2026-27134 8.1

This vulnerability allows unauthorized authentication in Strimzi Kafka clusters when using custom CA certificates with multi-stage chains. Attackers w...

📅 18 days ago • Feb 21, 2026
CVE-2026-2033 8.1

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on MLflow Tracking Server installations via directory traversal i...

📅 18 days ago • Feb 20, 2026
CVE-2026-27190 8.1

This CVE describes a command injection vulnerability in Deno's node:child_process implementation that allows attackers to execute arbitrary commands o...

📅 18 days ago • Feb 20, 2026
CVE-2026-22376 8.1

This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the Parkivia WordPress theme. Att...

📅 19 days ago • Feb 20, 2026
CVE-2026-22378 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22380 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22370 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22372 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22374 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22362 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22364 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...

📅 19 days ago • Feb 20, 2026
CVE-2026-22366 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-22368 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Redy WordPress theme by axiomthemes, allowing attackers to include arbitrary local ...

📅 19 days ago • Feb 20, 2026
CVE-2026-22344 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2026-20761 8.1

This vulnerability allows remote attackers to execute arbitrary operating system commands on EnOcean SmartServer IoT devices by sending specially craf...

📅 19 days ago • Feb 20, 2026
CVE-2025-69409 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the PJ | Life & Business Coaching WordPress theme. Attackers can include arbitrary loca...

📅 19 days ago • Feb 20, 2026
CVE-2025-69407 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Struktur WordPress theme. Attackers can include arbitrary local files through impro...

📅 19 days ago • Feb 20, 2026
CVE-2025-69395 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the ThemeREX Gable WordPress theme. Attackers can ...

📅 19 days ago • Feb 20, 2026
CVE-2025-69397 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the ThemeREX Tint WordPress theme. Attackers can exploit improper filename control in i...

📅 19 days ago • Feb 20, 2026
CVE-2025-69399 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the ThemeREX Cobble WordPress theme. Attackers can include arbitrary local files throug...

📅 19 days ago • Feb 20, 2026
CVE-2025-69375 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the SolverWp Portfolio Builder WordPress plugin. Attackers can exploit improper filenam...

📅 19 days ago • Feb 20, 2026
CVE-2025-69322 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the PeakShops WordPress theme. Attackers can poten...

📅 19 days ago • Feb 20, 2026
CVE-2025-68536 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2025-68543 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2025-67992 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 19 days ago • Feb 20, 2026
CVE-2025-67980 8.1

This CVE describes a Local File Inclusion (LFI) vulnerability in the Hara WordPress theme that allows attackers to include arbitrary local files throu...

📅 19 days ago • Feb 20, 2026
CVE-2025-67982 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Urna WordPress theme. Attackers can exploit improper filename control in include/re...

📅 19 days ago • Feb 20, 2026
CVE-2026-27475 8.1

SPIP versions before 4.4.9 contain an insecure deserialization vulnerability in the public area through the table_valeur filter and DATA iterator. Att...

📅 20 days ago • Feb 19, 2026
CVE-2026-26016 8.1

CVE-2026-26016 is an authorization bypass vulnerability in Pterodactyl Panel's Wings control plane that allows any authenticated Wings node to access ...

📅 20 days ago • Feb 19, 2026
CVE-2026-25940 8.1

This vulnerability in jsPDF allows attackers to inject arbitrary PDF objects, including JavaScript actions, through user-controlled properties in the ...

📅 20 days ago • Feb 19, 2026
CVE-2026-25755 8.1

This vulnerability in jsPDF allows attackers to inject arbitrary PDF objects into generated documents by controlling the argument of the `addJS` metho...

📅 20 days ago • Feb 19, 2026
CVE-2026-22267 8.1

Dell PowerProtect Data Manager versions before 19.22 have an incorrect privilege assignment vulnerability that allows low-privileged remote attackers ...

📅 20 days ago • Feb 19, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free