🔥 Trending CVEs - Last 90 Days
4,484 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes a path handling vulnerability (CWE-22) in multiple Apple operating systems and Safari that allows a remote attacker to write arbitr...
📅 29 days ago • Feb 11, 2026This CVE describes a logging vulnerability where sensitive user information was not properly redacted in system logs. Attackers with access to log fil...
📅 29 days ago • Feb 11, 2026This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network positio...
📅 29 days ago • Feb 11, 2026This vulnerability allows remote attackers to read arbitrary local files on systems running vulnerable Keras versions by exploiting a flaw in the HDF5...
📅 29 days ago • Feb 11, 2026A logic vulnerability in macOS allows remote attackers to cause denial-of-service conditions. This affects macOS Sequoia before 15.7.4 and macOS Sonom...
📅 29 days ago • Feb 11, 2026CVE-2026-26029 is a command injection vulnerability in sf-mcp-server that allows attackers to execute arbitrary shell commands by injecting malicious ...
📅 29 days ago • Feb 11, 2026Pillow versions 10.3.0 through 12.1.0 contain an out-of-bounds write vulnerability when processing specially crafted PSD image files. This could allow...
📅 29 days ago • Feb 11, 2026CVE-2020-37213 is a buffer overflow vulnerability in TextCrawler Pro that allows attackers to cause denial of service by crashing the application. Att...
📅 29 days ago • Feb 11, 2026CVE-2020-37214 is a directory traversal vulnerability in Voyager 1.3.0 that allows attackers to read sensitive system files by manipulating the asset ...
📅 29 days ago • Feb 11, 2026CVE-2020-37209 is a buffer overflow vulnerability in SpotFTP 3.0.0.0 that allows attackers to crash the application by entering a 1000-character paylo...
📅 29 days ago • Feb 11, 2026CVE-2020-37210 is a buffer overflow vulnerability in SpotIE 2.9.5 that allows attackers to cause denial of service by crashing the application. Attack...
📅 29 days ago • Feb 11, 2026SpotMSN 2.4.6 contains a buffer overflow vulnerability in the registration name field that allows attackers to crash the application by inputting a 10...
📅 29 days ago • Feb 11, 2026NetworkSleuth 3.0.0.0 contains a buffer overflow vulnerability in the registration key validation that allows attackers to crash the application by su...
📅 29 days ago • Feb 11, 2026RemShutdown 2.9.0.0 contains a buffer overflow vulnerability in its registration key input field that allows attackers to crash the application via de...
📅 29 days ago • Feb 11, 2026CVE-2020-37205 is a buffer overflow vulnerability in RemShutdown 2.9.0.0 that allows attackers to crash the application by sending overly long input t...
📅 29 days ago • Feb 11, 2026CVE-2020-37207 is a buffer overflow vulnerability in SpotDialup's registration key field that allows attackers to crash the application by pasting a 1...
📅 29 days ago • Feb 11, 2026CVE-2020-37197 is a buffer overflow vulnerability in Dnss Domain Name Search Software that allows attackers to cause denial of service by crashing the...
📅 29 days ago • Feb 11, 2026NBMonitor 1.6.6.0 contains a buffer overflow vulnerability in its registration key input field that allows attackers to crash the application by pasti...
📅 29 days ago • Feb 11, 2026NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input field. Attackers can crash the application by supplying...
📅 29 days ago • Feb 11, 2026CVE-2020-37191 is a buffer overflow vulnerability in Top Password Software Dialup Password Recovery 1.30 that allows attackers to crash the applicatio...
📅 29 days ago • Feb 11, 2026CVE-2020-37193 is a denial of service vulnerability in ZIP Password Recovery 2.30 where attackers can crash the application by providing a specially c...
📅 29 days ago • Feb 11, 2026BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration name input field that allows attackers to crash the application via d...
📅 29 days ago • Feb 11, 2026CVE-2020-37185 is a buffer overflow vulnerability in Backup Key Recovery 2.2.5 that allows attackers to crash the application by sending overly long i...
📅 29 days ago • Feb 11, 2026CVE-2020-37188 is a buffer overflow vulnerability in SpotOutlook 1.2.6 that allows attackers to cause denial of service by crashing the application. A...
📅 29 days ago • Feb 11, 2026TaskCanvas 1.4.0 contains a buffer overflow vulnerability in the registration code input field that allows attackers to cause denial of service by cra...
📅 29 days ago • Feb 11, 2026CVE-2020-37180 is a denial of service vulnerability in GTalk Password Finder 2.2.1 where attackers can crash the application by supplying an oversized...
📅 29 days ago • Feb 11, 2026AVideo Platform 8.1 contains an information disclosure vulnerability that allows attackers to enumerate user details through the playlistsFromUser.jso...
📅 29 days ago • Feb 11, 2026KeePass Password Safe versions before 2.44 contain a denial of service vulnerability in the help system's HTML handling. Attackers can cause applicati...
📅 29 days ago • Feb 11, 2026CVE-2020-37104 allows unauthenticated attackers to download database backup files from ASTPP VoIP billing software by brute-forcing predictable 6-digi...
📅 29 days ago • Feb 11, 2026CVE-2024-26480 is an information disclosure vulnerability in Statping-ng v0.91.0 that allows attackers to access sensitive information through crafted...
📅 29 days ago • Feb 11, 2026CVE-2024-26477 is an information disclosure vulnerability in Statping-ng v0.91.0 that allows attackers to access sensitive information through crafted...
📅 29 days ago • Feb 11, 2026A race condition vulnerability in Chrome DevTools allows attackers to potentially corrupt memory objects when users perform specific UI gestures and h...
📅 29 days ago • Feb 11, 2026This vulnerability in Sunbird-Ed portal version 1.13.4 disables TLS/SSL certificate validation, allowing attackers to intercept and potentially modify...
📅 29 days ago • Feb 11, 2026A directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to access sensitive files or delete arbitrary files by manipulating input to ...
📅 29 days ago • Feb 11, 2026This vulnerability allows unauthenticated remote attackers to access and export the internal telemetry SQLite database containing sensitive operationa...
📅 29 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to send repeated GraphQL queries to GitLab instances, causing denial of service by exhausting serv...
📅 29 days ago • Feb 11, 2026This vulnerability allows unauthenticated attackers to cause denial of service on GitLab instances by bypassing JSON validation middleware limits, lea...
📅 29 days ago • Feb 11, 2026This vulnerability in MongoDB allows connections from proxy ports to bypass connection counting, potentially causing server crashes when connection li...
📅 30 days ago • Feb 10, 2026ClipBucket v5 versions before 5.5.3 - #40 have a TOCTOU race condition in avatar/background image uploads. Attackers can upload malicious PHP files th...
📅 30 days ago • Feb 10, 2026This vulnerability in the Emmett framework allows unauthenticated attackers to send malformed Cookie headers that trigger unhandled CookieError except...
📅 30 days ago • Feb 10, 2026This vulnerability allows attackers to spoof identities or data in Microsoft Office Outlook by exploiting insecure deserialization of untrusted data. ...
📅 30 days ago • Feb 10, 2026This vulnerability allows an unauthorized attacker to trigger a null pointer dereference in Windows LDAP service, causing a denial of service. Any Win...
📅 30 days ago • Feb 10, 2026This vulnerability is a buffer over-read in Windows GDI+ that allows an unauthorized attacker to cause a denial of service over a network. It affects ...
📅 30 days ago • Feb 10, 2026This .NET vulnerability allows unauthorized attackers to perform spoofing attacks over a network by exploiting improper handling of missing special el...
📅 30 days ago • Feb 10, 2026The Ninja Forms WordPress plugin has a vulnerability that allows unauthenticated attackers to extract sensitive post metadata from any post on the sit...
📅 30 days ago • Feb 10, 2026Docpedia developed by Flowring contains a SQL injection vulnerability that allows unauthenticated remote attackers to execute arbitrary SQL commands a...
📅 30 days ago • Feb 10, 2026CVE-2026-0485 is a denial-of-service vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to crash and restart the C...
📅 31 days ago • Feb 10, 2026CVE-2026-0490 is an authentication bypass vulnerability in SAP BusinessObjects BI Platform that allows unauthenticated attackers to send crafted netwo...
📅 31 days ago • Feb 10, 2026Adminer v5.4.1 and earlier has a version check endpoint that lacks origin validation, allowing attackers to send malformed POST data. This causes a PH...
📅 31 days ago • Feb 9, 2026This vulnerability allows network attackers to intercept SumatraPDF's update requests and deliver malicious installers due to disabled TLS hostname ve...
📅 31 days ago • Feb 9, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats