🔥 Trending CVEs - Last 90 Days
4,461 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
In LavinMQ versions before 2.6.8, authenticated users with the 'Policymaker' management tag can bypass access controls to create shovels, allowing the...
📅 27 days ago • Feb 12, 2026A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all Qsync Cen...
📅 28 days ago • Feb 11, 2026A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all Qsync Cen...
📅 28 days ago • Feb 11, 2026A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all QNAP Qsyn...
📅 28 days ago • Feb 11, 2026A buffer overflow vulnerability in QNAP operating systems allows authenticated remote attackers to modify memory or crash processes. This affects user...
📅 28 days ago • Feb 11, 2026This vulnerability allows an unauthorized attacker to execute arbitrary code over a network by exploiting improper certificate validation in Azure Loc...
📅 29 days ago • Feb 10, 2026This vulnerability allows unauthenticated attackers to bypass LDAP authentication for Agentless VPN or FSSO policies in Fortinet FortiOS when the remo...
📅 29 days ago • Feb 10, 2026In File Browser versions before 2.57.1, authenticated users can bypass file access restrictions by adding extra slashes to file paths in requests. Thi...
📅 29 days ago • Feb 9, 2026This vulnerability in Keycloak allows attackers to modify invitation token payloads to self-register into unauthorized organizations. Attackers can ex...
📅 30 days ago • Feb 9, 2026This vulnerability in Nebula overlay networking tool allows attackers to bypass certificate blocklist entries when using P256 certificates (non-defaul...
📅 32 days ago • Feb 6, 2026CVE-2026-24135 is a path traversal vulnerability in Gogs self-hosted Git service that allows authenticated users with wiki write access to delete arbi...
📅 33 days ago • Feb 6, 2026Axigen Mail Server versions before 10.5.57 contain an improper access control vulnerability in the WebAdmin interface. A delegated admin account with ...
📅 34 days ago • Feb 5, 2026AutoGPT versions before beta-v0.6.46 log API keys and authentication secrets in plaintext when using Stagehand integration blocks. This exposes sensit...
📅 34 days ago • Feb 4, 2026OpenSlides versions before 4.2.29 have an authentication bypass vulnerability where users synced via external SAML identity providers can be logged in...
📅 35 days ago • Feb 4, 2026This vulnerability in n8n workflow automation platform allows attackers to write files to unintended locations on remote systems via SSH nodes, potent...
📅 35 days ago • Feb 4, 2026This vulnerability in Ziroom ZHOME A0101 devices allows attackers to gain unauthorized access via SSH using default credentials in the Dropbear SSH se...
📅 36 days ago • Feb 3, 2026A misconfiguration in TP-Link Archer AX53 v1.0's SSH hostkey implementation allows attackers to perform man-in-the-middle attacks to capture device cr...
📅 36 days ago • Feb 3, 2026This authentication bypass vulnerability in Moodle allows suspended users to authenticate through the LTI Provider, enabling unauthorized access to th...
📅 36 days ago • Feb 3, 2026This vulnerability allows authenticated attackers with Tutor Instructor-level access or higher to modify or delete arbitrary courses they do not own b...
📅 36 days ago • Feb 3, 2026PolarLearn's OAuth 2.0 implementation for GitHub and Google login is vulnerable to Login CSRF due to missing state parameter validation. This allows a...
📅 36 days ago • Feb 2, 2026This vulnerability in jsPDF allows attackers to inject arbitrary PDF objects, including JavaScript actions, through user-controlled input to specific ...
📅 36 days ago • Feb 2, 2026OpenList Frontend versions before 4.1.10 have TLS certificate verification disabled by default for storage communications, allowing Man-in-the-Middle ...
📅 36 days ago • Feb 2, 2026A vulnerability in fog-kubevirt allows remote attackers to perform Man-in-the-Middle attacks by intercepting communications between Satellite and Open...
📅 37 days ago • Feb 2, 2026This vulnerability in foreman_kubevirt disables SSL certificate verification by default when connecting to OpenShift without an explicitly set CA cert...
📅 37 days ago • Feb 2, 2026Simple CMS 2.1 contains a remote SQL injection vulnerability in the users module that allows authenticated attackers to execute arbitrary SQL commands...
📅 38 days ago • Feb 1, 2026PHP Melody 3.0 contains a remote SQL injection vulnerability in the video edit module that allows authenticated attackers to execute arbitrary SQL com...
📅 38 days ago • Feb 1, 2026Mult-E-Cart Ultimate 2.4 contains SQL injection vulnerabilities in multiple modules (inventory, customer, vendor, order) where attackers with vendor o...
📅 38 days ago • Feb 1, 2026The Tenda AX12 Pro V2 router contains hard-coded credentials in its Telnet service, allowing remote attackers to gain unauthorized access. This affect...
📅 41 days ago • Jan 29, 2026This vulnerability in the Custom Login Page Customizer WordPress plugin allows unauthenticated attackers to reset any user's password by knowing their...
📅 41 days ago • Jan 29, 2026This CSRF vulnerability in Drupal Acquia Content Hub allows attackers to trick authenticated administrators into performing unintended actions by craf...
📅 42 days ago • Jan 28, 2026A Cross-Site Request Forgery (CSRF) vulnerability in the Drupal Login Time Restriction module allows attackers to trick authenticated users into perfo...
📅 42 days ago • Jan 28, 2026SolarWinds Web Help Desk contains a security control bypass vulnerability that allows unauthenticated attackers to access restricted functionality. Th...
📅 42 days ago • Jan 28, 2026ConvertX versions before 0.17.0 have a path traversal vulnerability in the /delete endpoint that allows attackers to delete arbitrary files on the ser...
📅 42 days ago • Jan 27, 2026This vulnerability in GnuPG allows attackers to trigger a stack-based buffer overflow by sending specially crafted CMS/S-MIME messages with oversized ...
📅 43 days ago • Jan 27, 2026This CVE describes an authorization bypass in Grafana's dashboard permissions API where permission checks only validate the action permission without ...
📅 43 days ago • Jan 27, 2026This CVE describes a Missing Authorization vulnerability in the Tablesome WordPress plugin that allows attackers to bypass access controls and perform...
📅 47 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary code with root privileges on GPT Academic installations by exploiting insecure deseria...
📅 47 days ago • Jan 23, 2026This CVE describes a missing authorization vulnerability in the WP Recipe Maker WordPress plugin that allows attackers to bypass access controls. It a...
📅 48 days ago • Jan 22, 2026This CVE describes a missing authorization vulnerability in the WordPress User Registration plugin that allows attackers to exploit incorrectly config...
📅 48 days ago • Jan 22, 2026Dell PowerScale OneFS versions before 9.13.0.0 have a vulnerability where attackers can bypass authentication rate limiting. Unauthenticated remote at...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the Malta WordPress theme. Attack...
📅 48 days ago • Jan 22, 2026This path traversal vulnerability in VibeThemes WPLMS plugin allows attackers to delete arbitrary files on WordPress sites. It affects all WordPress i...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the North WordPress theme. Attackers can potential...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the Yolox WordPress theme. Attackers can potential...
📅 48 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 48 days ago • Jan 22, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats