🔥 Trending CVEs - Last 90 Days
4,485 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability allows unauthenticated attackers on the local network to execute arbitrary commands on affected NETGEAR routers and Orbi WiFi syste...
📅 43 days ago • Jan 28, 2026This CVE describes a server-side request forgery (SSRF) vulnerability in Chainlit versions before 2.9.4 when using the SQLAlchemy data layer backend. ...
📅 52 days ago • Jan 20, 2026The Kafka Connect BigQuery Connector prior to version 2.11.0 has an arbitrary file read vulnerability in credential configuration processing. Attacker...
📅 55 days ago • Jan 16, 2026This vulnerability allows any authenticated Rocket.Chat user to access OAuth application credentials (client_id and client_secret) by querying the /ap...
📅 57 days ago • Jan 14, 2026This vulnerability allows authenticated users to execute stored cross-site scripting (XSS) attacks through improper input validation in GitLab's Kuber...
📅 57 days ago • Jan 14, 2026CVE-2026-20852 is a privilege assignment vulnerability in Windows Hello that allows local attackers to tamper with authentication mechanisms. This aff...
📅 58 days ago • Jan 13, 2026This Windows Hello vulnerability allows an unauthorized local attacker to tamper with authentication processes due to incorrect privilege assignment. ...
📅 58 days ago • Jan 13, 2026CVE-2026-22035 is a command injection vulnerability in Greenshot screenshot utility that allows attackers to execute arbitrary operating system comman...
📅 63 days ago • Jan 8, 2026This vulnerability in the Frontend File Manager WordPress plugin allows any authenticated user, including low-privilege subscribers, to delete arbitra...
📅 64 days ago • Jan 7, 2026Emlog versions up to 2.5.19 are vulnerable to server-side request forgery (SSRF) via malicious SVG file uploads. Attackers can upload crafted SVG file...
📅 69 days ago • Jan 2, 2026This vulnerability in coturn TURN/STUN server allows attackers to predict random nonces and port assignments due to a weak random number generator. At...
📅 72 days ago • Dec 30, 2025This CVE describes a missing authorization vulnerability in Gmission Web Fax that allows attackers to abuse authentication mechanisms and falsify sess...
📅 73 days ago • Dec 29, 2025This vulnerability allows attackers to upload malicious files to web servers running Innorix WP, potentially leading to remote code execution. All ver...
📅 73 days ago • Dec 29, 2025A local privilege escalation vulnerability exists in IBM Concert due to a race condition involving symbolic link handling. This allows authenticated l...
📅 76 days ago • Dec 26, 2025A Local Privilege Escalation vulnerability in K7 Ultimate Security allows unprivileged local users to edit any registry key via insecure named pipe ac...
📅 80 days ago • Dec 22, 2025This CVE describes a Missing Authorization vulnerability in HappyFiles Pro WordPress plugin that allows attackers to bypass access controls. It affect...
📅 81 days ago • Dec 21, 2025This vulnerability in Weblate allows attackers to read arbitrary files from the server file system by exploiting crafted symbolic links in repositorie...
📅 84 days ago • Dec 18, 2025Zed code editor versions before 0.218.2-pre have an arbitrary code execution vulnerability where malicious Language Server Protocol configurations in ...
📅 85 days ago • Dec 17, 2025Zed code editor versions before 0.218.2-pre have an arbitrary code execution vulnerability where malicious MCP configurations in project settings file...
📅 85 days ago • Dec 17, 2025LINE client for iOS versions before 15.4 has a critical SSL/TLS certificate validation bypass vulnerability in an integrated financial SDK. This allow...
📅 87 days ago • Dec 15, 2025This vulnerability allows any authenticated user, even with the lowest 'visitor' role, to bypass authorization checks and perform unauthorized file op...
⚡ Yesterday • Mar 11, 2026This reflected XSS vulnerability in facileManager's fmDNS module allows attackers to inject malicious JavaScript via the log_search_query parameter in...
📅 2 days ago • Mar 10, 2026Ghost CMS versions 0.7.2 through 6.19.0 contain a vulnerability where malicious themes can execute arbitrary code on the server. This allows attackers...
📅 7 days ago • Mar 5, 2026Textream macOS teleprompter app versions before 1.5.1 have a WebSocket server that doesn't validate the Origin header, allowing malicious web pages to...
📅 10 days ago • Mar 2, 2026This SQL injection vulnerability in Mautic's API endpoint allows authenticated users to inject arbitrary SQL commands via the sort direction parameter...
📅 16 days ago • Feb 24, 2026This vulnerability allows attackers to inject malicious scripts via model outputs containing <script> tags in New API's MarkdownRenderer.jsx component...
📅 16 days ago • Feb 24, 2026This vulnerability allows authenticated administrators in Zscaler Internet Access (ZIA) to execute backend functions through improper input validation...
📅 17 days ago • Feb 23, 2026OpenClaw versions 2026.2.13 and below on macOS are vulnerable to OS command injection when refreshing OAuth tokens in the Keychain. This allows attack...
📅 19 days ago • Feb 21, 2026This CVE describes a missing authorization vulnerability in the AIO WP Builder WordPress plugin that allows attackers to bypass access controls. It af...
📅 20 days ago • Feb 20, 2026Fabric.js versions before 7.2.0 have an SVG export vulnerability where user-controlled JSON data isn't properly escaped when converted to SVG. This al...
📅 21 days ago • Feb 19, 2026This SQL injection vulnerability in the Bit Form WordPress plugin allows attackers to execute arbitrary SQL commands through the plugin's admin interf...
📅 21 days ago • Feb 19, 2026This vulnerability allows a malicious Mattermost server to execute arbitrary executables on a user's system when the user clicks on certain items in t...
📅 24 days ago • Feb 16, 2026OpenMetadata versions before 1.11.8 leak JSON Web Tokens (JWTs) used by the ingestion-bot service through API calls from the UI. This allows any read-...
📅 29 days ago • Feb 11, 2026A privilege escalation vulnerability in Outline document management systems allows authenticated users to gain unauthorized administrative privileges ...
📅 29 days ago • Feb 11, 2026This vulnerability allows authenticated attackers to inject malicious JavaScript into document titles in Polarion applications. When other users view ...
📅 30 days ago • Feb 10, 2026Gophish versions up to 0.12.1 expose users' long-lived API keys in the HTML/JavaScript of the administrative dashboard on every login. This allows any...
📅 34 days ago • Feb 6, 2026This CVE describes a cross-site scripting (XSS) vulnerability in Ofisimo's Association Web Package Flora software that allows attackers to inject mali...
📅 37 days ago • Feb 3, 2026This is a reflected cross-site scripting (XSS) vulnerability in Kod8 Individual and SME Website software that allows attackers to inject malicious scr...
📅 37 days ago • Feb 3, 2026This is a reflected cross-site scripting (XSS) vulnerability in Seres Software syWEB that allows attackers to inject malicious scripts into web pages....
📅 37 days ago • Feb 3, 2026This CVE describes a reflected cross-site scripting (XSS) vulnerability in AKCE Software's SKSPro product. Attackers can inject malicious scripts into...
📅 37 days ago • Feb 3, 2026This vulnerability allows a privileged user in IBM WebSphere Application Server Liberty to upload a zip archive containing path traversal sequences, w...
📅 38 days ago • Feb 2, 2026CVE-2026-25116 is an unauthenticated path traversal vulnerability in Runtipi homeserver orchestrator that allows remote attackers to overwrite the doc...
📅 42 days ago • Jan 29, 2026This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Discourse's FinalDestination component where hostname validation can be bypas...
📅 43 days ago • Jan 28, 2026This vulnerability allows attackers to inject malicious scripts into DNN module friendly names, which then execute during certain Persona Bar operatio...
📅 44 days ago • Jan 28, 2026This vulnerability allows attackers to inject malicious scripts into DNN module descriptions, which then execute in the Persona Bar administration int...
📅 44 days ago • Jan 28, 2026This vulnerability allows stored cross-site scripting (XSS) attacks in DNN CMS. Attackers with extension permissions can inject malicious scripts into...
📅 44 days ago • Jan 28, 2026This CVE describes a PHP Local File Inclusion vulnerability in the Omnipress WordPress plugin. Attackers can exploit improper filename control in incl...
📅 48 days ago • Jan 23, 2026This SQL injection vulnerability in the FireStorm Professional Real Estate WordPress plugin allows attackers to execute arbitrary SQL commands against...
📅 49 days ago • Jan 22, 2026This CVE describes a Missing Authorization vulnerability in the Broadstreet Ads WordPress plugin that allows attackers to bypass access controls. Atta...
📅 49 days ago • Jan 22, 2026This CVE describes a Missing Authorization vulnerability in the Hospital Doctor Directory WordPress plugin that allows attackers to bypass access cont...
📅 49 days ago • Jan 22, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats