🔥 Trending CVEs - Last 30 Days
1,258 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
A Cross-Site Request Forgery (CSRF) vulnerability in Dolibarr ERP & CRM v22.0.9 allows remote attackers to escalate privileges by exploiting the notes...
📅 23 days ago • Feb 12, 2026This CVE describes a race condition vulnerability in Apple operating systems that allows shortcuts to bypass sandbox restrictions through improper han...
📅 23 days ago • Feb 11, 2026This CVE describes a sandbox escape vulnerability in SandboxJS library versions before 0.8.31. It allows sandboxed JavaScript code to bypass isolation...
📅 25 days ago • Feb 9, 2026Wallos versions before 4.6.2 contain a server-side request forgery vulnerability in notification testers that allows attackers to make unauthorized re...
🔥 Today • Mar 7, 2026CVE-2026-30823 is an Insecure Direct Object Reference (IDOR) vulnerability in Flowise that allows attackers to bypass authorization controls. This ena...
🔥 Today • Mar 7, 2026This vulnerability allows authenticated WordPress users with Author-level access or higher to register administrator accounts through a registration f...
🔥 Today • Mar 7, 2026This vulnerability in OliveTin allows authentication bypass when JWT authentication is configured. Attackers can use validly signed JWT tokens intende...
🔥 Today • Mar 6, 2026This mass assignment vulnerability in Snipe-IT allows authenticated low-privileged users to modify restricted user attributes, including those of Supe...
⚡ Yesterday • Mar 6, 2026OpenSift versions before 1.6.3-alpha contain a path traversal vulnerability (CWE-22) in multiple storage helpers that don't properly enforce directory...
⚡ Yesterday • Mar 6, 2026This vulnerability allows authenticated low-privileged users in Chamilo LMS to upload malicious files and execute arbitrary code on the server. The sy...
⚡ Yesterday • Mar 6, 2026This stored XSS vulnerability in Chamilo LMS allows attackers to inject malicious JavaScript into social network and messaging features. When authenti...
⚡ Yesterday • Mar 6, 2026OpenClaw versions before 2026.2.14 have a command hijacking vulnerability where attackers can manipulate PATH environment variables to execute malicio...
⚡ Yesterday • Mar 5, 2026This vulnerability allows attackers to bypass authentication in Keycloak by exploiting a disabled SAML client configured as an Identity Provider-initi...
⚡ Yesterday • Mar 5, 2026The WowOptin WordPress plugin allows authenticated attackers with Subscriber-level access or higher to install and activate arbitrary plugins without ...
📅 2 days ago • Mar 5, 2026This vulnerability allows attackers to exploit heap corruption in Google Chrome's DevTools through malicious extensions. Users who install untrusted C...
📅 2 days ago • Mar 4, 2026Dell Command | Intel vPro Out of Band versions before 4.7.0 have a path traversal vulnerability that allows local low-privileged attackers to execute ...
📅 3 days ago • Mar 3, 2026A remote buffer overflow vulnerability in LLM-Claw's agent deployment component allows attackers to execute arbitrary code or crash the system. This a...
📅 4 days ago • Mar 3, 2026This vulnerability allows authenticated attackers with Agent-level access in the LatePoint WordPress plugin to escalate privileges by linking customer...
📅 4 days ago • Mar 3, 2026This CVE describes a one-click remote code execution vulnerability in AFFiNE workspace software. Attackers can exploit it by tricking users into visit...
📅 4 days ago • Mar 2, 2026This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary code on servers running the Master...
📅 5 days ago • Mar 2, 2026This vulnerability allows attackers to inject malicious scripts into Chamilo LMS user profiles via CSV import. When other users view these profiles, t...
📅 5 days ago • Mar 2, 2026A stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers to execute arbitrary code by manipulating the wpapsk_crypto2...
📅 5 days ago • Mar 2, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code or cause denial of service by sending speciall...
📅 5 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by sending specially crafted requests to the h...
📅 5 days ago • Mar 1, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda F453 routers by exploiting a buffer overflow in the frmL7ImForm function...
📅 6 days ago • Mar 1, 2026CVE-2026-3378 is a remote buffer overflow vulnerability in Tenda F453 routers affecting the qossetting function. Attackers can exploit this flaw remot...
📅 6 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the fr...
📅 6 days ago • Mar 1, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the Sa...
📅 6 days ago • Feb 28, 2026The Worry Proof Backup WordPress plugin contains a path traversal vulnerability that allows authenticated attackers with Subscriber-level access or hi...
📅 9 days ago • Feb 26, 2026This CVE allows attackers with read/write access to Vitess backup storage locations to manipulate backup manifest files and perform path traversal att...
📅 9 days ago • Feb 26, 2026This CVE describes a Python sandbox escape vulnerability in Agenta's API server that allows authenticated users to bypass RestrictedPython sandboxing ...
📅 9 days ago • Feb 26, 2026This vulnerability allows any authenticated non-admin user in WireGuard Portal to elevate their privileges to full administrator by sending a crafted ...
📅 9 days ago • Feb 26, 2026This vulnerability allows authenticated users with workflow creation/modification permissions in n8n to achieve remote code execution by chaining file...
📅 9 days ago • Feb 25, 2026LORIS versions before 26.0.5, 27.0.2, and 28.0.0 contain a path traversal vulnerability in the media module that allows authenticated users with suffi...
📅 9 days ago • Feb 25, 2026A heap buffer overflow vulnerability in FreeRDP clients allows a malicious RDP server to execute arbitrary code on connecting clients. Attackers contr...
📅 9 days ago • Feb 25, 2026OpenEMR versions before 8.0.0 contain a SQL injection vulnerability in the prescription listing functionality that allows authenticated attackers to e...
📅 9 days ago • Feb 25, 2026An SQL injection vulnerability in OpenEMR's Immunization module allows authenticated users to execute arbitrary SQL queries by manipulating patient_id...
📅 9 days ago • Feb 25, 2026This vulnerability in Cisco Catalyst SD-WAN Manager allows authenticated local users with low privileges to escalate to root privileges through the RE...
📅 10 days ago • Feb 25, 2026This vulnerability in JetBrains YouTrack allows applications to send unauthorized requests to the app permissions endpoint, potentially enabling privi...
📅 10 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parameter in the Sa...
📅 10 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fro...
📅 10 days ago • Feb 25, 2026A buffer overflow vulnerability in Tenda F453 routers allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the Nat...
📅 10 days ago • Feb 25, 2026This vulnerability allows authenticated users to upload .htaccess or .user.ini files to FreeScout help desk systems, enabling remote code execution on...
📅 10 days ago • Feb 25, 2026OpenEMR versions before 8.0.0 contain a broken access control vulnerability that allows low-privilege users (like Receptionist role) to add and modify...
📅 10 days ago • Feb 25, 2026EventSentry Web Reports interface versions before 6.0.1.20 contain an unverified password change vulnerability. Attackers with temporary access to an ...
📅 10 days ago • Feb 24, 2026Dell Wyse Management Suite versions before 5.5 have a missing authorization vulnerability that allows low-privileged remote attackers to elevate their...
📅 10 days ago • Feb 24, 2026This CVE describes a command injection vulnerability in Binardat 10G08-0800GSM network switch firmware that allows authenticated attackers to execute ...
📅 11 days ago • Feb 24, 2026This CVE describes a use-after-free vulnerability in Firefox's DOM Core & HTML components that could allow attackers to execute arbitrary code or caus...
📅 11 days ago • Feb 24, 2026This vulnerability allows arbitrary command injection in yt-dlp when using the --netrc-cmd option with maliciously crafted URLs. Attackers can execute...
📅 11 days ago • Feb 24, 2026A stack-based buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to execute arbitrary code by manipulating the boundary argume...
📅 11 days ago • Feb 24, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats