🔥 Trending CVEs - Last 90 Days

4,496 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,189
Total CVEs Published
995
Critical Severity
3,501
High Severity
⚠️
Critical Alert
995 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2025-67616 8.1

This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the Mella WordPress theme. Attack...

📅 48 days ago • Jan 22, 2026
CVE-2025-47555 8.1

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Tutor LMS WordPress plugin that allows attackers to bypass authorizatio...

📅 48 days ago • Jan 22, 2026
CVE-2026-24009 8.1

This vulnerability allows remote code execution through malicious YAML input in docling-core library versions 2.21.0 to 2.48.3. Attackers can execute ...

📅 48 days ago • Jan 22, 2026
CVE-2025-10856 8.1

This vulnerability allows attackers to upload malicious files to Teknoera software, potentially leading to file content injection attacks. It affects ...

📅 48 days ago • Jan 22, 2026
CVE-2026-24038 8.1

This vulnerability allows attackers to bypass two-factor authentication in Horilla HRMS by omitting the OTP field from authentication requests. When t...

📅 48 days ago • Jan 22, 2026
CVE-2026-23517 8.1

Fleet device management software versions before 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 have broken access control that allows any authenticated u...

📅 49 days ago • Jan 21, 2026
CVE-2026-21989 8.1

This vulnerability in Oracle VM VirtualBox allows a high-privileged attacker with local access to the host system to compromise VirtualBox, potentiall...

📅 50 days ago • Jan 20, 2026
CVE-2026-21973 8.1

This vulnerability in Oracle FLEXCUBE Investor Servicing allows authenticated attackers with low privileges to perform unauthorized data manipulation ...

📅 50 days ago • Jan 20, 2026
CVE-2026-0726 8.1

The Nexter Extension plugin for WordPress has a PHP object injection vulnerability that allows unauthenticated attackers to inject malicious PHP objec...

📅 50 days ago • Jan 20, 2026
CVE-2025-14977 8.1

This vulnerability allows authenticated attackers with customer-level permissions or higher to access and modify other vendors' store settings in the ...

📅 50 days ago • Jan 20, 2026
CVE-2026-23876 8.1

A heap buffer overflow vulnerability in ImageMagick's XBM image decoder allows attackers to write controlled data beyond allocated memory boundaries w...

📅 50 days ago • Jan 20, 2026
CVE-2026-23846 8.1

CVE-2026-23846 is a sensitive information exposure vulnerability in Tugtainer where passwords are transmitted via URL query parameters instead of secu...

📅 51 days ago • Jan 19, 2026
CVE-2025-62291 8.1

This vulnerability in strongSwan's eap-mschapv2 plugin allows a malicious EAP-MSCHAPv2 server to trigger an integer underflow and heap-based buffer ov...

📅 54 days ago • Jan 16, 2026
CVE-2025-14510 8.1

This vulnerability involves an incorrect implementation of an authentication algorithm in ABB Ability OPTIMAX, potentially allowing attackers to bypas...

📅 54 days ago • Jan 16, 2026
CVE-2026-22864 8.1

This vulnerability allows attackers to bypass Deno's security restrictions on Windows by using case variations in file extensions (.BAT, .Bat instead ...

📅 55 days ago • Jan 15, 2026
CVE-2025-66292 8.1

CVE-2025-66292 is an arbitrary file deletion vulnerability in DPanel server management panel. Authenticated users can delete any file on the server vi...

📅 55 days ago • Jan 15, 2026
CVE-2026-22856 8.1

This CVE describes a race condition vulnerability in FreeRDP's serial channel IRP thread tracking that allows heap use-after-free. Attackers could exp...

📅 56 days ago • Jan 14, 2026
CVE-2026-20856 8.1

This vulnerability allows an unauthorized attacker to execute arbitrary code on Windows Server Update Service (WSUS) servers by sending specially craf...

📅 57 days ago • Jan 13, 2026
CVE-2025-25249 8.1

A heap-based buffer overflow vulnerability in multiple Fortinet products allows attackers to execute arbitrary code or commands via specially crafted ...

📅 57 days ago • Jan 13, 2026
CVE-2026-0891 8.1

This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could potenti...

📅 57 days ago • Jan 13, 2026
CVE-2026-0877 8.1

This CVE describes a mitigation bypass vulnerability in the DOM Security component of Mozilla products. It allows attackers to circumvent security pro...

📅 57 days ago • Jan 13, 2026
CVE-2025-11669 8.1

This vulnerability allows attackers to bypass authorization controls in ManageEngine's privileged access management products when initiating remote se...

📅 57 days ago • Jan 13, 2026
CVE-2025-59022 8.1

This vulnerability allows backend users with access to the recycler module to delete arbitrary data from any database table defined in TYPO3's TCA, re...

📅 57 days ago • Jan 13, 2026
CVE-2026-0506 8.1

This CVE describes a Missing Authorization Check vulnerability in SAP ABAP systems that allows authenticated attackers to misuse RFC functions to exec...

📅 57 days ago • Jan 13, 2026
CVE-2026-0511 8.1

CVE-2026-0511 is a missing authorization vulnerability in SAP Fiori App Intercompany Balance Reconciliation that allows authenticated users to escalat...

📅 57 days ago • Jan 13, 2026
CVE-2025-68472 8.1

CVE-2025-68472 is an unauthenticated path traversal vulnerability in MindsDB's file upload API that allows attackers to read arbitrary files from the ...

📅 58 days ago • Jan 12, 2026
CVE-2025-41077 8.1

An Insecure Direct Object Reference (IDOR) vulnerability in Viafirma Inbox v4.5.13 allows authenticated users without privileges to list all users, ac...

📅 58 days ago • Jan 12, 2026
CVE-2025-41078 8.1

This vulnerability in Viafirma Documents v3.7.129 allows authenticated users without proper privileges to access other users' data, manipulate user ac...

📅 58 days ago • Jan 12, 2026
CVE-2025-14279 8.1

MLFlow versions up to 3.4.0 are vulnerable to DNS rebinding attacks due to missing Origin header validation in the REST server. This allows malicious ...

📅 58 days ago • Jan 12, 2026
CVE-2025-68493 8.1

This CVE describes a Missing XML Validation vulnerability in Apache Struts that allows attackers to inject malicious XML content. It affects Apache St...

📅 59 days ago • Jan 11, 2026
CVE-2025-62235 8.1

This vulnerability allows attackers to bypass authentication in Apache NimBLE by sending specially crafted Security Request packets. An attacker can r...

📅 60 days ago • Jan 10, 2026
CVE-2026-22196 8.1

This SQL injection vulnerability in GestSup allows authenticated attackers to manipulate database queries during ticket creation. Attackers can potent...

📅 61 days ago • Jan 9, 2026
CVE-2026-22197 8.1

This SQL injection vulnerability in GestSup allows authenticated attackers to manipulate database queries through asset list parameters. Attackers can...

📅 61 days ago • Jan 9, 2026
CVE-2026-22195 8.1

GestSup versions before 3.2.60 contain a SQL injection vulnerability in the search bar functionality. Authenticated attackers can manipulate database ...

📅 61 days ago • Jan 9, 2026
CVE-2025-67089 8.1

A command injection vulnerability in GL-iNet GL-AXT1800 router firmware allows authenticated attackers to execute arbitrary commands with root privile...

📅 62 days ago • Jan 8, 2026
CVE-2025-67934 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 62 days ago • Jan 8, 2026
CVE-2025-67935 8.1

This vulnerability allows attackers to include local PHP files on servers running the Optimize WordPress theme, potentially leading to remote code exe...

📅 62 days ago • Jan 8, 2026
CVE-2025-67936 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Curly WordPress theme by Mikado-Themes. Attackers can include arbitrary local files...

📅 62 days ago • Jan 8, 2026
CVE-2025-67937 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 62 days ago • Jan 8, 2026
CVE-2025-67925 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 62 days ago • Jan 8, 2026
CVE-2025-67917 8.1

This CVE describes a Missing Authorization vulnerability in the Traveler WordPress theme that allows attackers to bypass access controls. It affects a...

📅 62 days ago • Jan 8, 2026
CVE-2025-67919 8.1

This vulnerability allows attackers to bypass authorization controls in Woffice Core by manipulating user-controlled keys, potentially accessing unaut...

📅 62 days ago • Jan 8, 2026
CVE-2025-22715 8.1

This CVE describes a Missing Authorization vulnerability in the WP Attractive Donations System WordPress plugin that allows attackers to delete arbitr...

📅 62 days ago • Jan 8, 2026
CVE-2026-21697 8.1

A race condition vulnerability in axios4go Go HTTP client library allows concurrent requests to mutate shared HTTP client configuration without synchr...

📅 63 days ago • Jan 7, 2026
CVE-2025-69081 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 63 days ago • Jan 7, 2026
CVE-2025-69080 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...

📅 63 days ago • Jan 7, 2026
CVE-2025-15382 8.1

This heap buffer over-read vulnerability in wolfSSH's wolfSSH_CleanPath() function allows authenticated remote attackers to read one byte beyond alloc...

📅 64 days ago • Jan 6, 2026
CVE-2025-32304 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 64 days ago • Jan 6, 2026
CVE-2025-69083 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 64 days ago • Jan 6, 2026
CVE-2025-69086 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 64 days ago • Jan 6, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free