🔥 Trending CVEs - Last 90 Days

4,461 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,179
Total CVEs Published
981
Critical Severity
3,480
High Severity
⚠️
Critical Alert
981 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2026-25767 8.1

In LavinMQ versions before 2.6.8, authenticated users with the 'Policymaker' management tag can bypass access controls to create shovels, allowing the...

📅 27 days ago • Feb 12, 2026
CVE-2025-57709 8.1

A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all Qsync Cen...

📅 28 days ago • Feb 11, 2026
CVE-2025-52869 8.1

A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all Qsync Cen...

📅 28 days ago • Feb 11, 2026
CVE-2025-48723 8.1

A buffer overflow vulnerability in Qsync Central allows authenticated remote attackers to modify memory or crash processes. This affects all QNAP Qsyn...

📅 28 days ago • Feb 11, 2026
CVE-2025-48725 8.1

A buffer overflow vulnerability in QNAP operating systems allows authenticated remote attackers to modify memory or crash processes. This affects user...

📅 28 days ago • Feb 11, 2026
CVE-2026-21228 8.1

This vulnerability allows an unauthorized attacker to execute arbitrary code over a network by exploiting improper certificate validation in Azure Loc...

📅 29 days ago • Feb 10, 2026
CVE-2026-22153 8.1

This vulnerability allows unauthenticated attackers to bypass LDAP authentication for Agentless VPN or FSSO policies in Fortinet FortiOS when the remo...

📅 29 days ago • Feb 10, 2026
CVE-2026-25890 8.1

In File Browser versions before 2.57.1, authenticated users can bypass file access restrictions by adding extra slashes to file paths in requests. Thi...

📅 29 days ago • Feb 9, 2026
CVE-2026-1529 8.1

This vulnerability in Keycloak allows attackers to modify invitation token payloads to self-register into unauthorized organizations. Attackers can ex...

📅 30 days ago • Feb 9, 2026
CVE-2026-25793 8.1

This vulnerability in Nebula overlay networking tool allows attackers to bypass certificate blocklist entries when using P256 certificates (non-defaul...

📅 32 days ago • Feb 6, 2026
CVE-2026-24135 8.1

CVE-2026-24135 is a path traversal vulnerability in Gogs self-hosted Git service that allows authenticated users with wiki write access to delete arbi...

📅 33 days ago • Feb 6, 2026
CVE-2025-68721 8.1

Axigen Mail Server versions before 10.5.57 contain an improper access control vulnerability in the WebAdmin interface. A delegated admin account with ...

📅 34 days ago • Feb 5, 2026
CVE-2026-22038 8.1

AutoGPT versions before beta-v0.6.46 log API keys and authentication secrets in plaintext when using Stagehand integration blocks. This exposes sensit...

📅 34 days ago • Feb 4, 2026
CVE-2026-25519 8.1

OpenSlides versions before 4.2.29 have an authentication bypass vulnerability where users synced via external SAML identity providers can be logged in...

📅 35 days ago • Feb 4, 2026
CVE-2026-25055 8.1

This vulnerability in n8n workflow automation platform allows attackers to write files to unintended locations on remote systems via SSH nodes, potent...

📅 35 days ago • Feb 4, 2026
CVE-2026-1803 8.1

This vulnerability in Ziroom ZHOME A0101 devices allows attackers to gain unauthorized access via SSH using default credentials in the Dropbear SSH se...

📅 36 days ago • Feb 3, 2026
CVE-2025-62501 8.1

A misconfiguration in TP-Link Archer AX53 v1.0's SSH hostkey implementation allows attackers to perform man-in-the-middle attacks to capture device cr...

📅 36 days ago • Feb 3, 2026
CVE-2025-67848 8.1

This authentication bypass vulnerability in Moodle allows suspended users to authenticate through the LTI Provider, enabling unauthorized access to th...

📅 36 days ago • Feb 3, 2026
CVE-2026-1375 8.1

This vulnerability allows authenticated attackers with Tutor Instructor-level access or higher to modify or delete arbitrary courses they do not own b...

📅 36 days ago • Feb 3, 2026
CVE-2026-25221 8.1

PolarLearn's OAuth 2.0 implementation for GitHub and Google login is vulnerable to Login CSRF due to missing state parameter validation. This allows a...

📅 36 days ago • Feb 2, 2026
CVE-2026-24737 8.1

This vulnerability in jsPDF allows attackers to inject arbitrary PDF objects, including JavaScript actions, through user-controlled input to specific ...

📅 36 days ago • Feb 2, 2026
CVE-2026-25060 8.1

OpenList Frontend versions before 4.1.10 have TLS certificate verification disabled by default for storage communications, allowing Man-in-the-Middle ...

📅 36 days ago • Feb 2, 2026
CVE-2026-1530 8.1

A vulnerability in fog-kubevirt allows remote attackers to perform Man-in-the-Middle attacks by intercepting communications between Satellite and Open...

📅 37 days ago • Feb 2, 2026
CVE-2026-1531 8.1

This vulnerability in foreman_kubevirt disables SSL certificate verification by default when connecting to OpenShift without an explicitly set CA cert...

📅 37 days ago • Feb 2, 2026
CVE-2021-47918 8.1

Simple CMS 2.1 contains a remote SQL injection vulnerability in the users module that allows authenticated attackers to execute arbitrary SQL commands...

📅 38 days ago • Feb 1, 2026
CVE-2021-47915 8.1

PHP Melody 3.0 contains a remote SQL injection vulnerability in the video edit module that allows authenticated attackers to execute arbitrary SQL com...

📅 38 days ago • Feb 1, 2026
CVE-2021-47909 8.1

Mult-E-Cart Ultimate 2.4 contains SQL injection vulnerabilities in multiple modules (inventory, customer, vendor, order) where attackers with vendor o...

📅 38 days ago • Feb 1, 2026
CVE-2026-1610 8.1

The Tenda AX12 Pro V2 router contains hard-coded credentials in its Telnet service, allowing remote attackers to gain unauthorized access. This affect...

📅 41 days ago • Jan 29, 2026
CVE-2025-14975 8.1

This vulnerability in the Custom Login Page Customizer WordPress plugin allows unauthenticated attackers to reset any user's password by knowing their...

📅 41 days ago • Jan 29, 2026
CVE-2025-14472 8.1

This CSRF vulnerability in Drupal Acquia Content Hub allows attackers to trick authenticated administrators into performing unintended actions by craf...

📅 42 days ago • Jan 28, 2026
CVE-2025-13982 8.1

A Cross-Site Request Forgery (CSRF) vulnerability in the Drupal Login Time Restriction module allows attackers to trick authenticated users into perfo...

📅 42 days ago • Jan 28, 2026
CVE-2025-40536 8.1

SolarWinds Web Help Desk contains a security control bypass vulnerability that allows unauthenticated attackers to access restricted functionality. Th...

📅 42 days ago • Jan 28, 2026
CVE-2026-24741 8.1

ConvertX versions before 0.17.0 have a path traversal vulnerability in the /delete endpoint that allows attackers to delete arbitrary files on the ser...

📅 42 days ago • Jan 27, 2026
CVE-2026-24881 8.1

This vulnerability in GnuPG allows attackers to trigger a stack-based buffer overflow by sending specially crafted CMS/S-MIME messages with oversized ...

📅 43 days ago • Jan 27, 2026
CVE-2026-21721 8.1

This CVE describes an authorization bypass in Grafana's dashboard permissions API where permission checks only validate the action permission without ...

📅 43 days ago • Jan 27, 2026
CVE-2026-24524 8.1

This CVE describes a Missing Authorization vulnerability in the Tablesome WordPress plugin that allows attackers to bypass access controls and perform...

📅 47 days ago • Jan 23, 2026
CVE-2026-0762 8.1

This vulnerability allows remote attackers to execute arbitrary code with root privileges on GPT Academic installations by exploiting insecure deseria...

📅 47 days ago • Jan 23, 2026
CVE-2026-24357 8.1

This CVE describes a missing authorization vulnerability in the WP Recipe Maker WordPress plugin that allows attackers to bypass access controls. It a...

📅 48 days ago • Jan 22, 2026
CVE-2026-24353 8.1

This CVE describes a missing authorization vulnerability in the WordPress User Registration plugin that allows attackers to exploit incorrectly config...

📅 48 days ago • Jan 22, 2026
CVE-2026-22278 8.1

Dell PowerScale OneFS versions before 9.13.0.0 have a vulnerability where attackers can bypass authentication rate limiting. Unauthenticated remote at...

📅 48 days ago • Jan 22, 2026
CVE-2025-69314 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69078 8.1

This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the Malta WordPress theme. Attack...

📅 48 days ago • Jan 22, 2026
CVE-2025-69097 8.1

This path traversal vulnerability in VibeThemes WPLMS plugin allows attackers to delete arbitrary files on WordPress sites. It affects all WordPress i...

📅 48 days ago • Jan 22, 2026
CVE-2025-69100 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the North WordPress theme. Attackers can potential...

📅 48 days ago • Jan 22, 2026
CVE-2025-69071 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69072 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69073 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...

📅 48 days ago • Jan 22, 2026
CVE-2025-69074 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69075 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the Yolox WordPress theme. Attackers can potential...

📅 48 days ago • Jan 22, 2026
CVE-2025-69076 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free