🔥 Trending CVEs - Last 90 Days
4,484 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes a PHP Local File Inclusion vulnerability in the VanKarWai Airtifact WordPress theme. Attackers can include arbitrary local files th...
📅 21 days ago • Feb 19, 2026This vulnerability in soroban-sdk allows attackers to bypass security checks in Soroban smart contracts when trait and inherent functions share the sa...
📅 21 days ago • Feb 19, 2026An authenticated user with team edit permissions in Penpot can read arbitrary files from the server filesystem by exploiting a path traversal vulnerab...
📅 21 days ago • Feb 19, 2026This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks through the 'search' parameter in the Product Table an...
📅 21 days ago • Feb 19, 2026The wpForo Forum plugin for WordPress has a time-based SQL injection vulnerability in the 'wpfob' parameter that allows unauthenticated attackers to e...
📅 21 days ago • Feb 19, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 21 days ago • Feb 19, 2026OpenClaw versions 2026.1.30 and below have an authentication bypass vulnerability in Telegram webhook mode. When channels.telegram.webhookSecret is no...
📅 21 days ago • Feb 19, 2026This SQL injection vulnerability in the WordPress Library Management System plugin allows unauthenticated attackers to inject malicious SQL queries th...
📅 21 days ago • Feb 19, 2026The GDPR Cookie Consent WordPress plugin has an unauthenticated REST API vulnerability that allows attackers to retrieve sensitive plugin settings wit...
📅 21 days ago • Feb 19, 2026This vulnerability allows remote attackers to crash the web service on Bematech MP-4200 TH printers by sending specially crafted POST requests to the ...
📅 22 days ago • Feb 18, 2026CVE-2019-25353 is a buffer overflow vulnerability in Foscam Video Management System that allows attackers to cause denial of service by sending a spec...
📅 22 days ago • Feb 18, 2026CVE-2019-25355 is a directory traversal vulnerability in gSOAP 2.8 that allows unauthenticated attackers to access sensitive system files by manipulat...
📅 22 days ago • Feb 18, 2026CVE-2019-25349 is a buffer overflow vulnerability in ScadaApp for iOS that allows attackers to cause a denial of service by crashing the application. ...
📅 22 days ago • Feb 18, 2026CVE-2026-23491 is a path traversal vulnerability in InvoicePlane that allows unauthenticated attackers to read arbitrary files on the server by manipu...
📅 22 days ago • Feb 18, 2026This vulnerability in Rack's Rack::Directory component allows attackers to bypass directory restrictions using path traversal techniques. By crafting ...
📅 22 days ago • Feb 18, 2026A vulnerability in BIG-IP AFM or BIG-IP DDoS modules causes the Traffic Management Microkernel (TMM) to terminate when processing specific undisclosed...
📅 22 days ago • Feb 18, 2026This SQL injection vulnerability in the WPNakama WordPress plugin allows unauthenticated attackers to inject malicious SQL queries through the 'order'...
📅 22 days ago • Feb 18, 2026This vulnerability in Apache Tomcat Native and Apache Tomcat allows attackers to bypass certificate revocation checks when using OCSP responders. Impr...
📅 23 days ago • Feb 17, 2026A TLS certificate validation vulnerability in Guardian Gryphon v01.06.0006.22 allows attackers to bypass authentication and execute arbitrary commands...
📅 23 days ago • Feb 17, 2026The PhotoStack Gallery WordPress plugin contains an SQL injection vulnerability in the 'postid' parameter that allows unauthenticated attackers to exe...
📅 26 days ago • Feb 14, 2026This vulnerability allows authenticated WordPress users with Contributor-level access or higher to perform Local File Inclusion attacks via the Flexi ...
📅 26 days ago • Feb 14, 2026This vulnerability allows unauthenticated attackers to spoof BlueSnap IP addresses and send forged payment notifications to WordPress sites using the ...
📅 27 days ago • Feb 14, 2026A Null Pointer Dereference vulnerability in TON Blockchain's TVM allows attackers to crash validator nodes by sending malicious transactions. This cau...
📅 27 days ago • Feb 13, 2026A stack overflow vulnerability in TON Virtual Machine (TVM) allows attackers to craft smart contracts with deeply nested jump logic that exhausts stac...
📅 27 days ago • Feb 13, 2026A state pollution vulnerability in TON Virtual Machine (TVM) allows denial of service when Out-of-Gas exceptions occur during child VM initialization....
📅 27 days ago • Feb 13, 2026This CVE describes a Denial of Service vulnerability in TON Lite Server where attackers can inject malicious Continuation objects into locally execute...
📅 27 days ago • Feb 13, 2026This vulnerability in BACnet Stack allows attackers to write files to arbitrary directories due to lack of path validation in file writing functionali...
📅 27 days ago • Feb 13, 2026A heap buffer overflow vulnerability in free5GC's UPF component allows remote attackers to crash the UPF service via specially crafted PFCP Session Mo...
📅 27 days ago • Feb 13, 2026A protocol compliance vulnerability in free5GC's UPF component allows remote attackers to send malformed PFCP Association Setup Requests that violate ...
📅 27 days ago • Feb 13, 2026A remote array index out-of-bounds vulnerability in free5GC's AMF component allows attackers to crash the AMF service via specially crafted 5GS Mobile...
📅 27 days ago • Feb 13, 2026CVE-2019-25340 is a stack-based buffer overflow vulnerability in SpotAuditor's Base64 decryption feature that allows attackers to cause denial of serv...
📅 28 days ago • Feb 12, 2026CVE-2019-25342 is a denial of service vulnerability in Centova Cast that allows attackers to overwhelm the system by repeatedly calling the database e...
📅 28 days ago • Feb 12, 2026GHIA CamIP 1.2 for iOS contains a denial of service vulnerability where attackers can crash the application by pasting a 33-character buffer of repeat...
📅 28 days ago • Feb 12, 2026CVE-2019-25335 is an authentication bypass vulnerability in PRO-7070 Hazır Profesyonel Web Sitesi version 1.0. Attackers can gain administrative acce...
📅 28 days ago • Feb 12, 2026CVE-2019-25329 is a buffer overflow vulnerability in FTP Navigator 8.03 that allows attackers to crash the application via denial of service by overwr...
📅 28 days ago • Feb 12, 2026SurfOffline Professional 2.2.0.103 contains a structured exception handler overflow vulnerability in project name input. Attackers can crash the appli...
📅 28 days ago • Feb 12, 2026This vulnerability allows any pod within a Kubernetes cluster to send unauthorized AdmissionReview requests to Yoke's Air Traffic Controller webhook e...
📅 28 days ago • Feb 12, 2026Scraparr versions 3.0.0-beta through 3.0.1 expose Readarr API keys in Prometheus metrics when Readarr integration is enabled without an alias. This al...
📅 28 days ago • Feb 12, 2026This vulnerability allows remote attackers to cause moderate CPU usage spikes (2-4 times normal) on ntpd-rs servers with NTS enabled by sending malfor...
📅 28 days ago • Feb 12, 2026This vulnerability allows unauthenticated attackers to cause denial of service in Traefik reverse proxy by exploiting a STARTTLS timeout bypass. Attac...
📅 28 days ago • Feb 12, 2026This vulnerability in FrankenPHP worker mode allows session data from one user's request to be accessible to another user's request processed by the s...
📅 28 days ago • Feb 12, 2026A stack overflow vulnerability in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1.1 allows attackers to cause Denial o...
📅 28 days ago • Feb 12, 2026A heap buffer overflow vulnerability in Open TFTP Server MultiThreaded v1.7 allows attackers to cause a Denial of Service (DoS) by sending a specially...
📅 28 days ago • Feb 12, 2026CVE-2019-25347 is a SQL injection vulnerability in thesystem App 1.0 that allows attackers to bypass authentication by injecting malicious SQL code in...
📅 28 days ago • Feb 12, 2026CVE-2025-69807 is a buffer overflow vulnerability in p2r3 Bareiron that allows unauthenticated remote attackers to send specially crafted packets to c...
📅 28 days ago • Feb 12, 2026CVE-2025-69806 is an out-of-bounds read vulnerability in p2r3 bareiron software that allows unauthenticated remote attackers to leak relative informat...
📅 28 days ago • Feb 12, 2026This vulnerability allows authenticated users with REST/GraphQL API access in FreePBX to escalate privileges by forging JWTs using the api-oauth.key p...
📅 28 days ago • Feb 12, 2026This vulnerability in Halo blogging software allows remote attackers to cause denial of service by sending specially crafted payloads to the public co...
📅 28 days ago • Feb 12, 2026An unauthenticated attacker can exploit this vulnerability by manipulating URLs to read arbitrary files from the Valmet DNA Web Tools server. This aff...
📅 28 days ago • Feb 12, 2026This CVE describes a memory handling vulnerability in Apple operating systems and Safari that could allow a remote attacker to cause denial-of-service...
📅 29 days ago • Feb 11, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats