🔥 Trending CVEs - Last 90 Days
4,484 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes a Missing Authorization vulnerability in the Hotel Listing WordPress plugin that allows attackers to exploit incorrectly configured...
📅 49 days ago • Jan 22, 2026This CVE describes a missing authorization vulnerability in the Lawyer Directory WordPress plugin that allows attackers to bypass access controls. Att...
📅 49 days ago • Jan 22, 2026This vulnerability allows authenticated attackers to inject malicious HTML content into Project Release functionality in Altium Enterprise Server. Whe...
📅 49 days ago • Jan 22, 2026An incorrect authorization vulnerability in Devolutions Server's virtual gateway component allows attackers to bypass IP deny rules. This affects Devo...
📅 52 days ago • Jan 19, 2026A stored XSS vulnerability in Altium 365 user profile fields allows authenticated attackers to inject malicious scripts that execute when other users ...
📅 56 days ago • Jan 15, 2026A stack-based buffer overflow vulnerability in GNU Wget2's filename sanitization logic allows remote attackers to trigger memory corruption via specia...
📅 62 days ago • Jan 9, 2026This CVE describes an authorization bypass vulnerability in OPEXUS eCASE Audit where authenticated attackers can modify client-side JavaScript or craf...
📅 63 days ago • Jan 8, 2026This XXE vulnerability in Dell Unisphere for PowerMax allows low-privileged remote attackers to access unauthorized data and resources by exploiting i...
📅 65 days ago • Jan 6, 2026This SQL injection vulnerability in the Appointify WordPress plugin allows attackers to execute arbitrary SQL commands through unsanitized user input....
📅 72 days ago • Dec 30, 2025This CVE describes a buffer overflow vulnerability in the ESP-IDF BlueDroid AVRCP stack. An attacker could send specially crafted Bluetooth AVRCP comm...
📅 76 days ago • Dec 27, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Verisay's Aidango software that allows attackers to inject malicious scripts into web...
📅 77 days ago • Dec 25, 2025This is a cross-site scripting (XSS) vulnerability in Titarus software from Verisay Communication and Information Technology Industry and Trade Ltd. C...
📅 77 days ago • Dec 25, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Trizbi software by Verisay Communication and Information Technology Industry and Trad...
📅 77 days ago • Dec 25, 2025This SQL injection vulnerability in the AutomatorWP WordPress plugin allows attackers to execute arbitrary SQL commands on affected databases. All Wor...
📅 79 days ago • Dec 23, 2025This SQL injection vulnerability in the VillaTheme WPBulky WordPress plugin allows attackers to execute arbitrary SQL commands on the database. It aff...
📅 79 days ago • Dec 23, 2025The WP JobHunt plugin for WordPress (used by JobCareer theme) has a missing capability check that allows authenticated attackers with Candidate-level ...
📅 82 days ago • Dec 20, 2025This CVE describes a Missing Authorization vulnerability in the ThemeAtelier IDonatePro WordPress plugin that allows attackers to bypass access contro...
📅 84 days ago • Dec 18, 2025Open OnDemand versions 4.0.8 and earlier have a vulnerability where the Apache proxy passes sensitive headers to origin servers. This allows malicious...
📅 85 days ago • Dec 17, 2025This SQL injection vulnerability in the Stefano Lissa Newsletter WordPress plugin allows attackers to execute arbitrary SQL commands through blind inj...
📅 86 days ago • Dec 16, 2025This SQL injection vulnerability in the AIOSEO Broken Link Checker WordPress plugin allows attackers to execute arbitrary SQL commands on the database...
📅 86 days ago • Dec 16, 2025This vulnerability allows a malicious server to send specially crafted WebSocket frames with extremely large length values, causing undici's ByteParse...
🔥 Today • Mar 12, 2026The undici WebSocket client is vulnerable to a denial-of-service attack where a malicious WebSocket server can send a small compressed frame that expa...
🔥 Today • Mar 12, 2026CVE-2026-32141 is a stack overflow vulnerability in flatted's parse() function that allows attackers to crash Node.js applications by providing malici...
🔥 Today • Mar 12, 2026This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in the multipart Python library. Attackers can craft malicious HTTP or...
🔥 Today • Mar 12, 2026CVE-2019-25515 is an authentication bypass vulnerability in Jettweb PHP Hazir Haber Sitesi Scripti V3 that allows unauthenticated attackers to gain ad...
🔥 Today • Mar 12, 2026This SQL injection vulnerability in the My Sticky Bar WordPress plugin allows unauthenticated attackers to extract data from the database using blind ...
🔥 Today • Mar 12, 2026This vulnerability allows unauthenticated attackers to bypass authentication and permission checks in ZITADEL's SCIM API by using URL-encoded path val...
⚡ Yesterday • Mar 11, 2026CVE-2019-25478 is a buffer overflow vulnerability in GetGo Download Manager that allows remote attackers to cause denial of service by sending HTTP re...
⚡ Yesterday • Mar 11, 2026This authentication bypass vulnerability in eWON industrial routers allows attackers with minimal privileges to retrieve and decrypt all user password...
⚡ Yesterday • Mar 11, 2026This vulnerability allows unauthenticated attackers to perform directory traversal attacks on Hisilicon HiIpcam V100R003 devices, exposing sensitive c...
⚡ Yesterday • Mar 11, 2026This vulnerability allows any server that a cpp-httplib client connects to (including via redirects or man-in-the-middle attacks) to crash the client ...
⚡ Yesterday • Mar 11, 2026CVE-2026-31866 is a denial-of-service vulnerability in flagd feature flag daemon where unauthenticated attackers can send HTTP requests with arbitrari...
⚡ Yesterday • Mar 11, 2026CVE-2026-21888 is an out-of-bounds read vulnerability in NanoMQ MQTT Broker's MQTT v5 Variable Byte Integer parsing function. This allows attackers to...
⚡ Yesterday • Mar 11, 2026An unauthenticated attacker can cause denial of service on GitLab instances by sending specially crafted GraphQL requests that trigger uncontrolled re...
⚡ Yesterday • Mar 11, 2026An unauthenticated attacker can cause denial of service on GitLab instances by sending specially crafted requests to repository archive endpoints. Thi...
⚡ Yesterday • Mar 11, 2026This Server-Side Request Forgery (SSRF) vulnerability in Sunbird-Ed portal allows attackers to make the server send unauthorized requests to internal ...
⚡ Yesterday • Mar 11, 2026OpenClaw and its voice-call component accept WebSocket connections for media streams before validating authentication, allowing unauthenticated remote...
⚡ Yesterday • Mar 11, 2026This SQL injection vulnerability in the JetBooking WordPress plugin allows unauthenticated attackers to manipulate database queries via the 'check_in_...
⚡ Yesterday • Mar 11, 2026This vulnerability allows unauthenticated attackers to perform blind SQL injection attacks on WordPress sites using the Simply Schedule Appointments p...
⚡ Yesterday • Mar 11, 2026The WP Maps WordPress plugin contains a SQL injection vulnerability that allows unauthenticated attackers to extract sensitive data from the database....
⚡ Yesterday • Mar 11, 2026Adobe Commerce (formerly Magento) has an incorrect authorization vulnerability that allows attackers to bypass security controls and view sensitive da...
⚡ Yesterday • Mar 11, 2026CVE-2026-21289 is an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security controls and view unauthorized d...
⚡ Yesterday • Mar 11, 2026This SQL injection vulnerability in Sequelize allows attackers who control JSON object keys to inject arbitrary SQL queries through unescaped cast typ...
📅 2 days ago • Mar 10, 2026CVE-2026-30837 is a Regular Expression Denial of Service (ReDoS) vulnerability in the Elysia TypeScript framework's URL validation. Attackers can caus...
📅 2 days ago • Mar 10, 2026This vulnerability in Envoy's RBAC filter allows attackers to bypass access control policies by sending duplicate HTTP headers with malicious values. ...
📅 2 days ago • Mar 10, 2026This Server-Side Request Forgery (SSRF) vulnerability in pdfmake allows attackers to make unauthorized requests from the server to internal or externa...
📅 2 days ago • Mar 10, 2026FileBrowser Quantum versions before 1.3.1-beta and 1.2.2-stable have an incomplete fix for CVE-2026-27611, allowing password-protected shares to leak ...
📅 2 days ago • Mar 10, 2026This vulnerability allows attackers to execute arbitrary commands on Liderahenk systems without authentication. It affects all Liderahenk installation...
📅 2 days ago • Mar 10, 2026This cross-site scripting (XSS) vulnerability in Microsoft Office Excel allows attackers to inject malicious scripts into Excel files. When a user ope...
📅 2 days ago • Mar 10, 2026This CVE describes a server-side request forgery (SSRF) vulnerability in Azure IoT Explorer that allows unauthorized attackers to spoof requests over ...
📅 2 days ago • Mar 10, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats