🔥 Trending CVEs - Last 30 Days
1,266 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
An unauthenticated stack-based buffer overflow vulnerability in Grandstream GXP1600 series VoIP phones allows remote attackers to execute arbitrary co...
📅 16 days ago • Feb 18, 2026The YayMail WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Shop Manager access or higher to modify...
📅 17 days ago • Feb 18, 2026This vulnerability allows unauthenticated attackers to remotely change the password recovery email address via an exposed API endpoint. This affects H...
📅 17 days ago • Feb 17, 2026CVE-2026-23647 allows attackers to remotely authenticate to Glory RBG-100 recycler systems using hard-coded Linux credentials, including administrativ...
📅 17 days ago • Feb 17, 2026CVE-2026-2439 is a session ID generation vulnerability in Concierge::Sessions for Perl that allows attackers to guess session identifiers and gain una...
📅 18 days ago • Feb 16, 2026This vulnerability allows remote attackers to upload arbitrary files without restrictions to EFM iptime A6004MX routers via the commit_vpncli_file_upl...
📅 19 days ago • Feb 16, 2026CVE-2026-26369 is a privilege escalation vulnerability in eNet SMART HOME server where low-privileged users can elevate themselves to administrative p...
📅 19 days ago • Feb 15, 2026eNet SMART HOME server versions 2.2.1 and 2.3.1 ship with active default credentials (user:user, admin:admin) that don't require password changes duri...
📅 19 days ago • Feb 15, 2026This vulnerability allows unauthenticated attackers to bypass authorization and install arbitrary WordPress plugins via reverse DNS spoofing. It affec...
📅 20 days ago • Feb 15, 2026The Truelysell Core WordPress plugin allows unauthenticated attackers to create administrator accounts due to insufficient validation of the user_role...
📅 21 days ago • Feb 14, 2026The midi-Synth WordPress plugin allows unauthenticated attackers to upload arbitrary files due to missing validation in the 'export' AJAX action. This...
📅 21 days ago • Feb 14, 2026Known social publishing platform versions 1.6.2 and earlier contain a critical authentication bypass vulnerability where password reset tokens are exp...
📅 21 days ago • Feb 13, 2026Calero VeraSMART versions before 2022 R1 expose an unauthenticated .NET Remoting service on port 8001, allowing remote attackers to read/write arbitra...
📅 21 days ago • Feb 13, 2026This vulnerability allows attackers to achieve remote code execution on Calero VeraSMART servers by exploiting static ASP.NET machine keys. Attackers ...
📅 21 days ago • Feb 13, 2026This critical vulnerability in Milvus vector database allows unauthenticated attackers to bypass authentication and execute arbitrary operations. Atta...
📅 21 days ago • Feb 13, 2026CVE-2019-25337 is a username enumeration vulnerability in ownCloud that allows remote attackers to discover valid user accounts by sending crafted req...
📅 22 days ago • Feb 12, 2026CVE-2019-25327 is a critical buffer overflow vulnerability in Prime95 version 29.8 build 6 that allows remote attackers to execute arbitrary code by c...
📅 22 days ago • Feb 12, 2026CVE-2019-25319 is a critical stack overflow vulnerability in Domain Quester Pro 6.02 that allows remote attackers to execute arbitrary code by exploit...
📅 22 days ago • Feb 12, 2026CVE-2019-25321 is a critical stack overflow vulnerability in FTP Navigator 8.03 that allows attackers to execute arbitrary code by exploiting Structur...
📅 22 days ago • Feb 12, 2026Airleader Master versions 6.381 and prior have unrestricted file upload functionality on multiple webpages running with maximum privileges. This allow...
📅 22 days ago • Feb 12, 2026This vulnerability in Inspektor Gadget allows malicious containers to inject ANSI escape sequences into terminal output, potentially enabling terminal...
📅 22 days ago • Feb 12, 2026This vulnerability in FrankenPHP allows an attacker to manipulate Unicode characters in request paths to cause the server to execute unintended PHP fi...
📅 22 days ago • Feb 12, 2026CVE-2025-70314 is a critical buffer overflow vulnerability in webfsd 1.21 that allows remote attackers to execute arbitrary code by sending a speciall...
📅 22 days ago • Feb 12, 2026CVE-2026-26218 allows unauthenticated attackers to gain administrative control of newbee-mall applications by using predictable default passwords on p...
📅 22 days ago • Feb 12, 2026CVE-2025-70981 is a critical SQL injection vulnerability in CordysCRM 1.4.1 that allows attackers to execute arbitrary SQL commands through the depart...
📅 22 days ago • Feb 12, 2026This vulnerability allows attackers to upload malicious files to NTN Smart Panel systems, bypassing access controls. Attackers can execute arbitrary c...
📅 22 days ago • Feb 12, 2026This SQL injection vulnerability in Farktor Software's E-Commerce Package allows attackers to execute arbitrary SQL commands through the application. ...
📅 22 days ago • Feb 12, 2026This critical vulnerability in the AdForest WordPress theme allows unauthenticated attackers to bypass authentication and log in as any user, includin...
📅 23 days ago • Feb 12, 2026This vulnerability in the PF-50 1.2 keyfob of the PGST PG107 Alarm System allows attackers to perform code replay attacks, enabling unauthorized acces...
📅 23 days ago • Feb 11, 2026CVE-2026-26021 is a prototype pollution vulnerability in the npm package set-in that allows attackers to modify Object.prototype through crafted array...
📅 23 days ago • Feb 11, 2026A buffer overflow vulnerability in PJSIP's PJNATH ICE Session component allows attackers to execute arbitrary code or cause denial of service by sendi...
📅 23 days ago • Feb 11, 2026CVE-2020-37186 is a critical remote code execution vulnerability in Chevereto image hosting software. Attackers can inject malicious PHP code during d...
📅 23 days ago • Feb 11, 2026CVE-2020-37181 is a critical stack overflow vulnerability in Torrent FLV Converter 1.51 Build 117 that allows attackers to execute arbitrary code by e...
📅 23 days ago • Feb 11, 2026CVE-2020-37183 is a critical stack overflow vulnerability in Allok RM RMVB to AVI MPEG DVD Converter that allows remote code execution. Attackers can ...
📅 23 days ago • Feb 11, 2026CVE-2020-37176 is a critical stack overflow vulnerability in Torrent 3GP Converter 1.51 that allows remote attackers to execute arbitrary code by expl...
📅 23 days ago • Feb 11, 2026CVE-2020-37153 allows attackers to execute arbitrary system commands and perform cross-site scripting attacks in ASTPP VoIP billing software. This can...
📅 23 days ago • Feb 11, 2026This vulnerability in DiskCache (python-diskcache) allows arbitrary code execution when an attacker with write access to the cache directory injects m...
📅 23 days ago • Feb 11, 2026This CVE describes a stack buffer overflow vulnerability in OpenSatKit 2.2.1's file management component. Attackers can exploit this by providing long...
📅 23 days ago • Feb 11, 2026CVE-2025-69874 is a critical path traversal vulnerability in nanotar that allows attackers to write arbitrary files outside the intended extraction di...
📅 23 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to remotely change device passwords via an unprotected API endpoint. It affects systems running vu...
📅 23 days ago • Feb 11, 2026METIS WIC devices with firmware versions up to oscore 2.1.234-r18 expose an unauthenticated web-based shell at the /console endpoint. This allows remo...
📅 23 days ago • Feb 11, 2026This vulnerability allows attackers to insert sensitive information into externally accessible files or directories in Logo j-Platform due to incorrec...
📅 23 days ago • Feb 11, 2026This CVE describes a link following vulnerability in QNAP operating systems that allows remote attackers to traverse the file system to unintended loc...
📅 24 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to access critical functions in Dinosoft ERP without proper authentication or access controls. Att...
📅 24 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to upload arbitrary PHP files to WordPress sites using the WPvivid Backup & Migration plugin, lead...
📅 24 days ago • Feb 11, 2026CVE-2026-25993 is a second-order SQL injection vulnerability in EverShop eCommerce platform that allows attackers to execute arbitrary SQL commands. A...
📅 24 days ago • Feb 10, 2026This critical vulnerability in Azure SDK allows remote code execution through deserialization of untrusted data. Attackers can exploit this over a net...
📅 24 days ago • Feb 10, 2026CASL Ability versions 2.4.0 through 6.7.4 contain a prototype pollution vulnerability that allows attackers to modify JavaScript object prototypes, po...
📅 24 days ago • Feb 10, 2026This authentication bypass vulnerability in Apache Druid allows attackers to gain unauthorized access by exploiting LDAP anonymous bind configurations...
📅 25 days ago • Feb 10, 2026This Server-Side Request Forgery (SSRF) vulnerability in Teknolist Okulistik allows attackers to make unauthorized requests from the vulnerable server...
📅 25 days ago • Feb 10, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats