🔥 Trending CVEs - Last 90 Days
4,453 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes a command injection vulnerability in WPGraphQL's GitHub Actions workflow that allows arbitrary command execution when merging pull ...
📅 14 days ago • Feb 26, 2026Plane project management tool versions before 1.2.2 contain a Full Read SSRF vulnerability in the 'Add Link' feature. Authenticated users can send arb...
📅 15 days ago • Feb 25, 2026An authenticated remote attacker can cause a denial of service (DoS) on Cisco Nexus 9000 Series Fabric Switches in ACI mode by sending continuous SNMP...
📅 15 days ago • Feb 25, 2026This vulnerability allows a malicious actor to take over local user accounts when federated authentication with Silent Just-In-Time Provisioning is en...
📅 16 days ago • Feb 24, 2026Wallos versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the logo/icon upload functionality. Attackers can bypass...
📅 19 days ago • Feb 21, 2026This vulnerability allows authenticated users in Metabase to extract sensitive information including database credentials via template evaluation in e...
📅 19 days ago • Feb 21, 2026This path traversal vulnerability in the WordPress User Extra Fields plugin allows attackers to delete arbitrary files on the server. It affects all W...
📅 20 days ago • Feb 20, 2026This path traversal vulnerability in the Woo File Dropzone WordPress plugin allows attackers to delete arbitrary files on the server. It affects all W...
📅 20 days ago • Feb 20, 2026CVE-2025-1272 is a Linux kernel vulnerability where lockdown mode is disabled without warning in Fedora Linux kernel versions 6.12+, allowing attacker...
📅 22 days ago • Feb 18, 2026This vulnerability allows unauthenticated attackers to mark WooCommerce orders as paid without actual payment by reusing valid payment tokens from oth...
📅 23 days ago • Feb 17, 2026CVE-2026-25991 is a Blind Server-Side Request Forgery (SSRF) vulnerability in Tandoor Recipes that allows authenticated users to make the server conne...
📅 27 days ago • Feb 13, 2026A high-privileged user in Infoblox NIOS can exploit the account creation mechanism to write arbitrary files to the system. This affects Infoblox NIOS ...
📅 28 days ago • Feb 12, 2026This CVE describes an out-of-bounds read vulnerability in macOS kernel memory that could allow an attacker to cause system crashes or read sensitive k...
📅 28 days ago • Feb 11, 2026A buffer overflow vulnerability in MUNGE authentication daemon (munged) versions 0.5 to 0.5.17 allows local attackers to leak cryptographic key materi...
📅 30 days ago • Feb 10, 2026SAP Solution Tools Plug-In (ST-PI) contains an authorization bypass vulnerability where authenticated users can access sensitive information without p...
📅 30 days ago • Feb 10, 2026This CVE describes a denial-of-service vulnerability in SAP systems where authenticated users can trigger excessive resource consumption by invoking a...
📅 30 days ago • Feb 10, 2026Cube semantic layer versions 0.27.19 through 1.5.12, 1.4.1 and earlier, and 1.0.13 and earlier contain an API token validation vulnerability that allo...
📅 30 days ago • Feb 9, 2026This cross-site scripting (XSS) vulnerability in Mattermost's Confluence plugin allows authenticated Confluence users with malicious display names to ...
📅 34 days ago • Feb 6, 2026OpenClaw versions before 2026.1.29 contain two command injection vulnerabilities. Attackers can execute arbitrary commands on remote SSH hosts via une...
📅 36 days ago • Feb 4, 2026This vulnerability in n8n workflow automation platform allows uninitialized memory allocation via Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in...
📅 36 days ago • Feb 4, 2026This vulnerability allows a local attacker with physical USB access to cause a full device reset by using an invalid reset file. It affects devices th...
📅 38 days ago • Feb 2, 2026This vulnerability allows attackers to execute arbitrary Python code on TechDocs build servers when configured with 'runIn: local'. Malicious actors w...
📅 41 days ago • Jan 30, 2026This vulnerability allows attackers to intercept unencrypted update requests and deliver malicious packages to affected NETGEAR routers and Orbi WiFi ...
📅 43 days ago • Jan 28, 2026This vulnerability allows unauthenticated attackers on the local network to execute arbitrary commands on affected NETGEAR routers and Orbi WiFi syste...
📅 43 days ago • Jan 28, 2026This CVE describes a server-side request forgery (SSRF) vulnerability in Chainlit versions before 2.9.4 when using the SQLAlchemy data layer backend. ...
📅 51 days ago • Jan 20, 2026The Kafka Connect BigQuery Connector prior to version 2.11.0 has an arbitrary file read vulnerability in credential configuration processing. Attacker...
📅 55 days ago • Jan 16, 2026This vulnerability allows any authenticated Rocket.Chat user to access OAuth application credentials (client_id and client_secret) by querying the /ap...
📅 57 days ago • Jan 14, 2026This vulnerability allows authenticated users to execute stored cross-site scripting (XSS) attacks through improper input validation in GitLab's Kuber...
📅 57 days ago • Jan 14, 2026CVE-2026-20852 is a privilege assignment vulnerability in Windows Hello that allows local attackers to tamper with authentication mechanisms. This aff...
📅 58 days ago • Jan 13, 2026This Windows Hello vulnerability allows an unauthorized local attacker to tamper with authentication processes due to incorrect privilege assignment. ...
📅 58 days ago • Jan 13, 2026CVE-2026-22035 is a command injection vulnerability in Greenshot screenshot utility that allows attackers to execute arbitrary operating system comman...
📅 63 days ago • Jan 8, 2026This vulnerability in the Frontend File Manager WordPress plugin allows any authenticated user, including low-privilege subscribers, to delete arbitra...
📅 64 days ago • Jan 7, 2026Emlog versions up to 2.5.19 are vulnerable to server-side request forgery (SSRF) via malicious SVG file uploads. Attackers can upload crafted SVG file...
📅 69 days ago • Jan 2, 2026This vulnerability in coturn TURN/STUN server allows attackers to predict random nonces and port assignments due to a weak random number generator. At...
📅 72 days ago • Dec 30, 2025This CVE describes a missing authorization vulnerability in Gmission Web Fax that allows attackers to abuse authentication mechanisms and falsify sess...
📅 73 days ago • Dec 29, 2025This vulnerability allows attackers to upload malicious files to web servers running Innorix WP, potentially leading to remote code execution. All ver...
📅 73 days ago • Dec 29, 2025A local privilege escalation vulnerability exists in IBM Concert due to a race condition involving symbolic link handling. This allows authenticated l...
📅 76 days ago • Dec 26, 2025A Local Privilege Escalation vulnerability in K7 Ultimate Security allows unprivileged local users to edit any registry key via insecure named pipe ac...
📅 80 days ago • Dec 22, 2025This CVE describes a Missing Authorization vulnerability in HappyFiles Pro WordPress plugin that allows attackers to bypass access controls. It affect...
📅 81 days ago • Dec 21, 2025This vulnerability in Weblate allows attackers to read arbitrary files from the server file system by exploiting crafted symbolic links in repositorie...
📅 83 days ago • Dec 18, 2025Zed code editor versions before 0.218.2-pre have an arbitrary code execution vulnerability where malicious Language Server Protocol configurations in ...
📅 84 days ago • Dec 17, 2025Zed code editor versions before 0.218.2-pre have an arbitrary code execution vulnerability where malicious MCP configurations in project settings file...
📅 84 days ago • Dec 17, 2025LINE client for iOS versions before 15.4 has a critical SSL/TLS certificate validation bypass vulnerability in an integrated financial SDK. This allow...
📅 87 days ago • Dec 15, 2025This vulnerability allows any authenticated user, even with the lowest 'visitor' role, to bypass authorization checks and perform unauthorized file op...
⚡ Yesterday • Mar 11, 2026This reflected XSS vulnerability in facileManager's fmDNS module allows attackers to inject malicious JavaScript via the log_search_query parameter in...
📅 2 days ago • Mar 10, 2026Ghost CMS versions 0.7.2 through 6.19.0 contain a vulnerability where malicious themes can execute arbitrary code on the server. This allows attackers...
📅 7 days ago • Mar 5, 2026Textream macOS teleprompter app versions before 1.5.1 have a WebSocket server that doesn't validate the Origin header, allowing malicious web pages to...
📅 10 days ago • Mar 2, 2026This SQL injection vulnerability in Mautic's API endpoint allows authenticated users to inject arbitrary SQL commands via the sort direction parameter...
📅 16 days ago • Feb 24, 2026This vulnerability allows attackers to inject malicious scripts via model outputs containing <script> tags in New API's MarkdownRenderer.jsx component...
📅 16 days ago • Feb 24, 2026This vulnerability allows authenticated administrators in Zscaler Internet Access (ZIA) to execute backend functions through improper input validation...
📅 17 days ago • Feb 23, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats